Author:
Aziz Benjamin,Lee John Arthur,Akkuzu Gulsum
Publisher
Springer International Publishing
Reference21 articles.
1. Akkuzu, G., Aziz, B., et al.: Feature analysis on the containment time for cyber security incidents. In: 2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), pp. 262–269. IEEE (2018)
2. Aziz, B.: Towards open data-driven evaluation of access control policies. Comput. Stan. Interfaces 56, 13–26 (2018)
3. Cano, L.A.: A modern approach to security: Using systems engineering and data-driven decision-making. In: 2016 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 1–5, October 2016
4. Center for Applied Internet Data Analysis: CAIDA Data. http://www.caida.org/data/overview/ . Accessed 14 Aug 2017
5. CERT Coordination Center: CERT Vulnerability Notes Database. http://www.kb.cert.org/vuls . Accessed 14 Aug 2017