http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Designing Secure SCADA Systems Using Security Patterns
Fernandez, E.B.; Larrondo-Petrie, M.M. IEEE 2010 p.909-916
Efficient Cryptographic Primitives for Private Data Mining
Shaneck, M.; Kim, Y. IEEE 2010 p.917-925
Endpoint Configuration Compliance Monitoring via Virtual Machine Introspection
Kienzle, D.; Persaud, R.; Elder, M. IEEE 2010 p.926-935
Fine-Grained Inspection for Higher-Assurance Software Security in Open Source
McDermott, J.P. IEEE 2010 p.936-945
Formality of the Security Specification Process: Benefits Beyond Requirements
Romera-Mariona, J.; Ziv, H.; Richardson, D.J. IEEE 2010 p.946-951
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Shue, C.A.; Gupta, M. IEEE 2010 p.952-961
Measuring Similarity for Security Vulnerabilities
Wang, J.A.; Zhou, L.; Guo, M.; Wang, H.; Camargo, J. IEEE 2010 p.962-971
Ranking Attacks Based on Vulnerability Analysis
Wang, J.A.; Wang, H.; Guo, M.; Zhou, L.; Camargo, J. IEEE 2010 p.972-981
Sweet Dreams and Rude Awakening - Critical Infrastructure's Focal IT-Related Incidents
Tervo, H.; Wiander, T. IEEE 2010 p.982-989
Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks
Hu, Y.; Panda, B. IEEE 2010 p.990-998