Author:
Kheir Nizar,Cuppens-Boulahia Nora,Cuppens Frédéric,Debar Hervé
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Aceituno, V.: Return on security investment. ISSA Jounal 1, 16–19 (2006)
2. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proc. 9th ACM Conf. on Computer and Communications Security, pp. 217–224 (2002)
3. Artz, M.L.: A Network Security Planning Architecture. Ph.D. thesis, Cambrdige: Massachusetts Institute of Technology (May 2002)
4. Lecture Notes in Computer Science;I. Balepin,2003
5. Cuppens, F., Autrel, F., Yacine Bouzida, J.G., Gombault, S., Sans, T.: Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annals of Telecommunications 61, 197–217 (2006)
Cited by
72 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献