Author:
Dalalana Bertoglio Daniel,Zorzo Avelino Francisco
Publisher
Springer Science and Business Media LLC
Reference85 articles.
1. Lam K, LeBlanc D, Smith BI (2004) Assessing network security. Redmond, Wash. Microsoft Press, Washington.
2. Kizza JM (2010) Guide to computer network security. Springer, London.
3. Zhao JJ, Zhao SY, Zhao SY (2010) Opportunities and threats: a security assessment of state e-government websites. Gov Inf Q 27(1): 49–56.
4. Whitaker A, Newman D (2005) Penetration testing and Cisco network defense. Cisco Press, Indianapolis.
5. Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1): 114–132.
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献