Author:
McQueen Miles A.,Boyer Wayne F.,Flynn Mark A.,Beitel George A.
Reference15 articles.
1. Browne, H. K., McHugh, J., Arbaugh, W.A. and Fithen, W.L., “A trend Analysis of Exploitations,” technical report CS-TR-4200, University of Maryland and Software Engineering Institute, November 2002.
2. Cohen, F., “Managing Network Security The Millisecond Fantasy,” http://all.net/journal/netsec/1999-2003.html , 2003.
3. Evans, M., Hastings, N. and Peacock, B., “Statistical Distributions,” Second Edition, 1993.
4. Jonsson, E., “A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior,” IEEE Transactions on Software Engineering, Vol 23 No 4, April 1997.
5. Rescorla, E., “Is Finding Security Holes a Good Idea,” IEEE Security & Privacy, January–February 2005.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献