Author:
Rowe Neil C.,Rrushi Julian
Publisher
Springer International Publishing
Reference26 articles.
1. Barber R, Kim J (2001) Belief revision process based on trust: agents evaluating reputation of information sources. In: Falcone R, Singh M, Tan Y-H (eds) Trust in cyber-societies, LNAI 2246. Springer, Berlin, pp 73–82
2. Belmonte M, Conejo R, Perez-De-La-Cruz J, Triguero F (2006) Experiments on robustness and deception in a coalition formation model. Concurrency and Computation: Practice and Experience 18(4):371–386
3. Capelli D, Moore A, Trzeciak R (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud). Addison-Wesley, Upper Saddle River, NJ
4. Casey E (ed) (2011) Digital evidence and computer crime: forensic science, computers, and the Internet. Academic, Waltham, MA
5. Dornsief M, Holz T, Klein C (2004) NoSEBrEaK – attacking honeynets. In: Proceedings of the fifth IEEE workshop on information assurance and security, West Point, NY, 10–11 June 2004. pp 123–129
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献