共 290 条
- [31] Carver C.A., 2001, Proceedings of the IEEE Workshop on Information Assurance and Security, P5
- [32] Analytical models for risk-based intrusion response [J]. COMPUTER NETWORKS, 2013, 57 (10) : 2181 - 2192
- [33] Chen Z., 2012, SOFTW ENG KNOWL ENG
- [34] Chengpo Mu, 2010, Proceedings of the Third International Joint Conference on Computational Sciences and Optimization (CSO 2010), P395, DOI 10.1109/CSO.2010.30
- [35] Chouhan PK, 2023, Arxiv, DOI arXiv:2303.03070
- [37] Selecting appropriate counter-measures in an intrusion detection framework [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 78 - 87
- [38] da Silva Paulo Fernando, 2007, International Journal of Network Management, V17, P287, DOI 10.1002/nem.626
- [39] Debar H, 2008, ADV INFORM SECUR, V38, P129
- [40] Enabling automated threat response through the use of a dynamic security policy [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (03): : 195 - 210