Author:
Montasari Reza,Hosseinian-Far Amin,Hill Richard
Publisher
Springer International Publishing
Reference66 articles.
1. Aagedal, J. O., Den Braber, F., Dimitrakos, T., Gran, B. A., Raptis, D., & Stolen, K. (2002). Model-based risk assessment to improve enterprise security. In The 6th International Conference on Enterprise Distributed Object Computing (pp. 51–62).
2. Anderson, B., & McGrew, D. (2017). OS fingerprinting: New techniques and a study of information gain and obfuscation. Cisco Systems, Inc. arXiv preprint arXiv: 1706.08003.
3. Apostolaki, M., Zohar, A., & Vanbever, L. (2017). Hijacking bitcoin: Routing attacks on cryptocurrencies. In IEEE Symposium on Security and Privacy (SP) (pp. 375–392).
4. Bada, M., Creese, S., Goldsmith, M., Mitchell, C., & Phillips, E. (2014). Computer security incident response teams (CSIRTs) an overview. Global Cyber Security Capacity Centre (pp.1–23).
5. Chen, B., Peng, X., Yu, Y., Nuseibeh, B., & Zhao, W. (2014). Self-adaptation through incremental generative model transformations at runtime. In The 36th International Conference on Software Engineering (pp. 676–687).
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献