Author:
Liu Shu-Fan,Chueh Hao-En,Liao Kuo-Hsiung
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Arthur, E.H., Bosworth, S., Hoyt, D.B.: Computer Security Handbook. John Wiley & Sons, New York (1995)
2. Badenhorst, K.P., Elloff, J.H.P.: Framework of a Methodology for the Life Cycle of Computer Security in an Organization. Computer & Security 8(5), 433–442 (1989)
3. Christophy, A., Dorofee, A.: Introduction to the OCTAVE Method. The CERT® Coordination Center, CERT/CC (2001)
4. Ellison, R.J., Linger, R.C., Longstaff, T., Mead, N.R.: Survivable Network System Analysis: A Case Study. IEEE Software 16(4), 70–77 (1999)
5. Eloff, J.H.P., Eloff, M.M.: Information security architecture. Computer Fraud & Security 11, 10–16 (2005)