共 29 条
- [1] Allsopp W., 2009, UNAUTHORISED ACCESS
- [2] Arnold F., 2013, 9 INT C INF ASS SEC
- [4] Blakley B., 2001, P 2001 WORKSH NEW SE, P97
- [5] Ceraolo, 1996, INFORM SYSTEMS SECUR, V4, P37, DOI https://doi.org/10.1080/10658989609342519
- [6] Dimkov T, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P399
- [7] Elo AE., 1978, RATING CHESSPLAYERS
- [8] Franqueira VNL, 2009, P 24 ANN ACM S APPL, P66
- [9] Furnell S, 2008, COMPUT FRAUD SECUR, P8, DOI 10.1016/S1361-3723(08)70081-2
- [10] Gula R., 1999, ENTERASYS NETWORKS