Publisher
Springer International Publishing
Reference15 articles.
1. Adelstein, F.: Live forensics: diagnosing your system without killing it first. Commun. ACM 49(2), 63–66 (2006)
2. Sutherland, I., Evans, J., Tryfonas, T., Blyth, A.: Acquiring volatile operating system data tools and techniques. SIGOPS Oper. Syst. Rev. 42(3), 65–73 (2008)
3. European Network and Information Security Agency (ENISA): Technical Guidelines on Reporting Incidents: Article 13a Implementation, Heraklion, Greece, December 2011
4. US Government Auditors Office: Information Security: FAA Needs to Address Weaknesses in Air Traffic Control Systems, GAO-15-221, 29 January 2015
5. Naedele, M.: Addressing IT security for critical control systems. In: Proceedings of the 40th Hawaii International Conference on System Sciences. IEEE Computer Society (2007)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献