Author:
Mu Chengpo,Yu Meng,Li Yingjiu,Zang Wanyu
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference46 articles.
1. Stakhanova, N., Basu, S., Wong, J.: A Taxonomy of Intrusion Response Systems. Technical Report 06–05. Department of Computer Science, Iowa State University (2006)
2. Mu, C., Li, Y.: An intrusion response decision-making model based on hierarchical task network planning. Expert Syst. Appl. 37(3), 2465–2472 (2010)
3. Foo, B., Wu, Y.-S., Mao, Y.-C., et al.: ADEPTS: Adaptive intrusion response using attack graphs in an E-commerce environment. In: Proceeding of the DSN-DCC Symposium 2005. Yokohama, Japan (2005)
4. Gehani, A., Kedem, G.: RheoStat: Real-time risk management. In: Proceeding of 7th International Symposium on Recent Advances in Intrusion Detection. Sophia Antipolis, France (2004)
5. Nguyen, Q.L., Sood, A.: A comparison of intrusion-tolerant system architectures. IEEE Secur. Priv. 9(4), 24–31 (2011)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献