共 50 条
- [42] Computer system security threat evaluation based upon artificial immunity model and fuzzy logic INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1297 - 1302
- [44] A Hierarchical Architectural Model for Network Security Exploring Situational Awareness SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1365 - 1372
- [45] A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response NETWORK, 2024, 4 (01): : 68 - 90
- [46] Ontology Based Approach for Network Security PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 573 - 578
- [47] The Study on Network Security Strategy based on Security Evaluation COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
- [48] Network Security in the Context of the Botnets Threat 6TH ROEDUNET INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 80 - 82
- [50] A Threat Model-Driven Security Testing Approach for Web Application CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 158 - 168