Author:
Kieseberg Peter,Skopik Florian,Pahi Timea,Leitner Maria,Fiedler Roman
Publisher
Springer Berlin Heidelberg
Reference37 articles.
1. (Balboni, 2013) Balboni, Paolo, and Milda Macenaite. “Privacy by Design and anonymisation techniques in action: Case study of Ma3tch technology”. Computer Law & Security Review 29, no. 4 (2013): 330-340.
2. (Barnum, 2012) Barnum, Sean. “Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX™)”. MITRE Corporation 11 (2012): 1-22.
3. (Bragg, 2004) Bragg, R., 2004. Hardening windows systems. McGraw-Hill/Osborne.
4. (Case, 1990) Case, Jeffrey D., Mark Fedor, Martin L. Schoffstall, and James Davin. Simple network management protocol (SNMP). No. RFC 1157. 1990.
5. (Daemen, 2013) Daemen, Joan, and Vincent Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Reacting to Cyber Incidents;Studies in Systems, Decision and Control;2024
2. Resilient Operations;Studies in Systems, Decision and Control;2024