Author:
Kroculick Joseph,Hood Cynthia
Reference21 articles.
1. Avĭzienis, A., Laprie, J-C., Randall B., Landwehr, C. (2004). Basic Concepts and Taxonomy of Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, 2004, Vol. 1, Pages 11-33, January-March.
2. Bloomfield, R., Masera, M., Miller, A., Sydjari, O.S., Weinstock, C.B. (2007). Assurance Cases for Security: The Metrics Challenge, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’07).
3. Bushong, M., Gadecki, C. & Garret, A. (2008). JUNOS For Dummies, Wiley Publishing, Inc.
4. CMMI Product Team (2010). CMMI for Services, Version 1.3, no. CMU/SEI-2010-TR-034, November, http://www.sei.cmu.edu.
5. Deca, R., Cherkaoui, O., & Puche, D. (2004). A Validation Solution for Network Configuration, Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR’04), IEEE.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献