共 50 条
[1]
Turning IT Security Into Effective Business Risk Management, (2003)
[2]
Adelstein F., Live forensics: Diagnosing your system without killing it first, Communications of the ACM, 49, 2, pp. 63-66, (2006)
[3]
Ammann P., Wijesekera D., Kaushik S., Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 217-224, (2002)
[4]
Brumley D., Newsome J., Song D., Wang H., Jha S., Towards automatic generation of vulnerability-based signatures, Proceedings - IEEE Symposium on Security and Privacy, 2006, pp. 2-16, (2006)
[5]
Brumley D., Newsome J., Song D., Wang H., Jha S., Theory and Techniques for Automatic Generation of Vulnerability-based Signatures, (2007)
[6]
BugTraq, SecurityFocus, (2009)
[7]
Common Attack Pattern Enumeration and Classification, A Community Knowledge Resource for Building Secure software, (2009)
[8]
Unique identifiers for common system configuration issues, Common Configuration Enumeration, (2009)
[9]
A structured naming scheme for IT systems, platforms and packages, Common Platform Enumeration, (2009)
[10]
A community-developed dictionary of software weakness types, Common Weaknesses Enumeration, (2009)