[1]
Lawrence A. Gordon and Martin P. Loeb, The Economics of Information Security Investment, ACM Transactions on Information and System Security, Vol. 5, No. 4, Nov. 2002, Pages 438-457.
DOI: 10.1145/581271.581274
Google Scholar
[2]
Maiwald, E., Network security: A beginner's guide, Osborne/McGrawHill, Berkeley, CA, (2001).
Google Scholar
[3]
Huseyin Cavusoglu and Srinivasan Raghunathan, Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches, International Conference on Information Systems (ICIS), Dec. (2003).
Google Scholar
[4]
J. Yuill, F. Wu, J. Settle, F. Gong, R. Forno, M. Huang and J. Asbery, Intrusion-Detection for Incident-Response: using a military battlefield-intelligence process, Computer Networks, 34 (2000) 671-697.
DOI: 10.1016/s1389-1286(00)00142-0
Google Scholar
[5]
Flaviu Cristian, A recovery mechanism for modular software, Proceedings of the 4th international conference on Software engineering, Munich, Germany, (1979).
Google Scholar
[6]
Ken Sakamura, Koichi Nakano, Yoshio Kato, and Hideo Aiso, A new approach to an adaptive computer—an automatic recovery mechanism to prevent the occurrence of subtract errors, Proceedings of the 6th annual symposium on Computer architecture.
DOI: 10.1145/800090.802890
Google Scholar
[7]
Icove, D.J. Collaring the cybercrook: an investigator's view; IEEE Spectrum, Jun 97 31-36.
DOI: 10.1109/6.591662
Google Scholar
[8]
Landreth, B. (1985). Out of the Inner Circle,. Redmond, Microsoft Books. Lia, B. (2000).
Google Scholar