Author:
Meinig Michael,Sukmana Muhammad I.H.,Torkura Kennedy A.,Meinel Christoph
Reference45 articles.
1. Computer Viruses and Malware”;Aycock,2006
2. Barnum, S. (2008) “Common Attack Pattern Enumeration and Classification (CAPEC) Schema Description”, Cigital Inc., https://capec.mitre.org/
3. Bell, D. E., LaPadula, L. J. (1976) “Secure computer system: Unified Exposition and Multics Interpretation”, Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA.
4. Computer Security - Art and Science”;Bishop,2003
5. Computer Security Handbook”;Bosworth,2009
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Smart Technologies as a Tool for Increasing the Competitiveness of the Company;Management and Industrial Engineering;2024
2. Enhancing Circular Economy Using Expert Systems;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023-12-15
3. Deep Dive On Various Security Challenges, Threats And Attacks Over The Cloud Security;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17
4. Advancement of Circular Economy Supported by Intelligent Communication System;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023
5. Security and Privacy Challenges in Big Data;Proceedings of Third Doctoral Symposium on Computational Intelligence;2022-11-10