Publisher
Springer International Publishing
Reference12 articles.
1. Anderson J (1980) Computer security threat monitoring and surveillance. James P. Anderson Co., Fort Washington
2. Axelsson S (2000) The base-rate fallacy and the difficulty of intrusion detection. ACM Trans Inf Syst Secur 3(3):186–205
3. Banaerjee P, Bash C, Friedrich R, Goldsack P, Huberman B, Manley J, Patel C, Ranganathan P, Veitch A (2011) Everything as a service: powering the new information economy. IEEE Comput 44(3):36–43
4. Cheswick WR, Bellovin SM, Rubin AD (2003) Firewalls and internet security, 2nd edn. Addison-Wesley, Boston
5. Rutkowski A, Kadobayashi Y, Furey I, Rajnovid D, Martin R, Takahashi T (2010) Cybex the cybersecurity information exchange framework (X.1500). ACM SIGCOMM Comput Commun Rev 40(5):59–64
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献