共 49 条
[1]
Agrawal M., 2012, International Journal on Computer Science and Engineering, V4, P877
[2]
Alba E, 2008, OPER RES COMPUT SCI, V42, P1, DOI 10.1007/978-0-387-77610-1
[3]
[Anonymous], CODASPY
[4]
[Anonymous], 2011, P 5 INT C INF TECHN, DOI DOI 10.1109/ICIMU.2011.6122717
[5]
[Anonymous], 2013, 27001 ISOIEC
[6]
A novel intrusion severity analysis approach for Clouds
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE,
2013, 29 (01)
:416-428
[7]
Bailey C., 2011, Proceedings of the 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), P37, DOI 10.1109/DASC.2011.31
[8]
Bailey C., 2014, SEAMS 14
[9]
Calder A., 2012, IT GOVERNANCE INT GU, VFifth
[10]
Cha J., 2012, Int. Conf. on IT Conv. and Sec, P41, DOI DOI 10.1007/978-94-007-2911-7_4