1 "Vulner ability Measures for Network Vulner ability Analysis System" nov.2002.
2 "The challenge of building survivable information intensive systems" august : 39-43, 2000.August
3 "The Process of Network Security" 2000.
4 "Simulating Cyber Attacks, Defenses, and Consequences" 1999.
5 "Network SecurityModel- ingandCyber-attack Simulation Metho- dology" jul.2001.
6 "Intrusion Detection" Intrusion Net Books 1999.
7 "Intelligent Agents and Endomorphic Systems" modularmodels1990.
8 "Defensive Information Operations" 1997.June
9 "CACS - A Process Control Approach to Cyber Attack Detection" 44 (44): 2001
10 "Are We Forgetting the Risks of Information Technology" 43-51, dec.2000.
1 "Vulner ability Measures for Network Vulner ability Analysis System" nov.2002.
2 "The challenge of building survivable information intensive systems" august : 39-43, 2000.August
3 "The Process of Network Security" 2000.
4 "Simulating Cyber Attacks, Defenses, and Consequences" 1999.
5 "Network SecurityModel- ingandCyber-attack Simulation Metho- dology" jul.2001.
6 "Intrusion Detection" Intrusion Net Books 1999.
7 "Intelligent Agents and Endomorphic Systems" modularmodels1990.
8 "Defensive Information Operations" 1997.June
9 "CACS - A Process Control Approach to Cyber Attack Detection" 44 (44): 2001
10 "Are We Forgetting the Risks of Information Technology" 43-51, dec.2000.