Author:
Borky John M.,Bradley Thomas H.
Publisher
Springer International Publishing
Reference36 articles.
1. Verizon Enterprise Services (2017) Data Breach Investigations Report (DBIR).
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
. Accessed 30 May 2017
2. Veris Community (2014) VERIS framework.
http://veriscommunity.net/veris-overview.html
. Accessed 31 May 2017
3. Whitmore JJ (2001) A method for designing secure solutions. IBM Syst J 40(3):747–768
4. Hershey P, Silo C (2012) Procedure for detection of and response to distributed denial of service cyber attacks on complex enterprise systems. In Proceedings of 6th Annual International Systems Conference, Vancouver, 19–22 March 2012, p 85–90
5. NIST Computer Security Division (2006) Guide for developing security plans for federal information systems, NIST SP 800-18. rev 1.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf
. Accessed 31 My 2017
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献