Author:
Volpatto Alberto,Maggi Federico,Zanero Stefano
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Carr, J.: Inside Cyber Warfare: Mapping the Cyber Underworld. O’Reilly Media, Inc., Sebastopol (2009)
2. The SANS Institute: Zero-day vulnerability trends (September 2009),
http://www.sans.org/top-cyber-security-risks/zero-day.php
3. Fishwick, P.A.: An integrated approach to system modeling using a synthesis of artificial intelligence, software engineering and simulation methodologies. ACM Trans. Model. Comput. Simul. 2(4), 307–330 (1992)
4. Fishwick, P.A., Zeigler, B.P.: A multimodel methodology for qualitative model engineering. ACM Trans. Model. Comput. Simul. 2(1), 52–81 (1992)
5. Denning, D.E.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)