共 21 条
[11]
Open source software research activities in AIST towards secure open systems
[J].
7TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS,
2002,
:37-41
[12]
An open source(d) controller
[J].
INTELEC 07 - 29TH INTERNATIONAL TELECOMMUNICATIONS ENERGY CONFERENCE, VOLS 1 AND 2,
2007,
:761-768
[13]
Open source in security: Visiting the bizarre
[J].
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2000,
:126-127
[14]
Schroder C., ENHANCE SECURITY LIN
[17]
Spitzner L., 2003, Definitions and value of honeypots
[18]
An architecture for intrusion detection using honey pot
[J].
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS,
2003,
:2096-2100
[19]
Toolbox for Information Technology, SYMM KEY ENCRYPT
[20]
Viega J., MYTH OPEN SOURCE SEC