|
[1] Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, and Robert Richardson, “CSI/FBI Computer Crime and Security Survey,” 2006 [2] Alex Shipp, “Targeted Trojan Attacks and Industrial Espionage ,” Virus Bulletin Conference, 2006 [3] Yi-Luen Lin, “Near Optimal Protection Strategies against Targeted Attacks on the Core Node of a Network” [4] Partha Pal, Franklin Webber, and Richard Schaniz, “Survival by Defense-Enable,” OASIS, 2003 [5] SANS-ISC (SysAdmin, Audit, Network, Security Institute - Internet Storm Center), http://isc.sans.org/survivalhistory.php [6] Matt Loney and Robert Lemos, “Study: Unpatched PCs compromised in 20 minutes,” CNET News.com, Aug. 2004 [7] Zeid Nasser, “‘Survival Time’ must be increased!” http://zeidnasser.blogspot.com, Jun. 2005 [8] Fred Cohen, “Managing Network Security - Attack and Defense Strategies,” Network Security, Jul. 1999 [9] Kong-wei Lye, and Jeannette M. Wing, “Game strategies in network security,” International Journal of Information Security , Vol. 4, No. 1-2, pp. 71-86, Feb. 2005 [10] Milton Abramowitz., and Irene A. Stegun, “Normal or Gaussian Probability Function,” Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, p.931, 1964 [11] Malware-Test Lab, http://www.malware-test.com/ [12] Bracewell, R. "Convolution" and "Two-Dimensional Convolution," The Fourier Transform and Its Applications, 3rd Ed, pp. 25-50 and 243-244, New York: McGraw-Hill, 1999 [13] Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin, “Lagrangian Relaxation and Network Optimization,”Network Flows: Theory, Algorithm, and Application, pp. 598-639, Prentice Hall, Inc., Jan. 1993 [14] Marshall L. Fisher, “The Lagrangian Relaxation Method for Solving Integer Programming Problems,” Management Science, Vol. 27, No. 1, pp. 1-18, Jan. 1981 [15] Marshall L. Fisher, “An Application Oriented Guide to Lagrangian Relaxation,” Interfaces, Vol. 15, No. 2, pp. 10-21, Apr. 1985 [16] Wasel Chemij, “Parallel Computer Taxonomy,” MPhil, Aberystwyth University, 1994 [17] Albert-Laszlo Barabasi, and Reka Albert, “Emergence of Scaling in Random Networks,” Science, Vol. 286, pp. 509-512, Oct. 1999
|