期刊文献+

计算机网络攻击特性研究 被引量:2

下载PDF
导出
摘要 讨论了计算机网络的安全性需求 。
作者 尹晓东
出处 《湖北师范学院学报(自然科学版)》 2001年第2期101-102,共2页 Journal of Hubei Normal University(Natural Science)
  • 相关文献

同被引文献21

  • 1王立达,霍焱.浅谈计算机网络攻击的实现方法[J].科技风,2010(22). 被引量:1
  • 2Helmer G, Wong J, Slagell M, et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System[A].In Symposium on Requirements Engineering for Information Security[C]. Indianapolis, USA, 2001.
  • 3Steffan Jan,Schumacher Markus. Collaborative Attack Modeling[Z]. ACM 1-58113-445-02/02/03.2002-02.
  • 4Tidwell T Larson R Fitch K Hale J. Modeling Internet Attacks[M]. ISBN 0-7803-9814-9. June 2001.
  • 5Scambray Joel, McClure Stuart, Kurtz George. Hacking Exposed: Network Security Secrets & Solutions[M] (Second Edition).Berkley: McGraw Hill, 2001.
  • 6Schudel Gregg, Wood Bradley. Modeling Behavior of the Cyber Terrorist[A]. Proceedings of 2000 National Information Systems Security Conference[C]. Baltimore MD, October 2000.
  • 7Moore Andrew, Ellison Robert, Linger Richard. Attack Modeling for Informational Security and Survivability[DB/OL]. CMU/SEI -2001-TN-001. March 2001. http://www. cert.org/archive/pdf/01 tn001.pdf, 2001-03.
  • 8Ahuja, Vijay. Network and Internet Security[Z]. Boston, MA:Academic Press. 1996.
  • 9Sandeep Kumar. Classification and detection of computer intrusions [D/OL]. PurdueUniversity, ftp://coast.cs. purdue.edu/pub/COAST/papers/sandeep-kumar/kumar-intdet-phddiss.ps.Z. WestLafayette, USA, 1995.
  • 10Staniford-Chen S, Tung B, Schnackenberg D. The Common Intrusion Detection Framework (CIDF)[Z]. Information Survivability Workshop, Orlando FL, October 1998.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部