default search action
Cyberpatterns 2014
- Clive Blackwell, Hong Zhu:
Cyberpatterns, Unifying Design Patterns with Security and Attack Patterns. Springer 2014, ISBN 978-3-319-04446-0 - Hong Zhu:
Cyberpatterns: Towards a Pattern Oriented Study of Cyberspace. 3-15 - Clive Blackwell:
Towards a Conceptual Framework for Security Patterns. 17-34 - Kevin Lano:
Design Patterns: Applications and Open Issues. 37-45 - Ian Bayley:
Challenges for a Formal Framework for Patterns. 47-55 - Hong Zhu:
Towards a General Theory of Patterns. 57-69 - David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. 73-84 - Alberto E. Schaeffer Filho, Paul Smith, Andreas Mauthe, David Hutchison:
Management Patterns for Network Resilience: Design and Verification of Policy Configurations. 85-95 - Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. 97-105 - Clive Blackwell:
A Strategy for Structuring and Formalising Attack Patterns. 111-123 - Noor-ul-Hassan Shirazi, Alberto E. Schaeffer Filho, David Hutchison:
Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks. 125-134 - Clive Blackwell:
Towards a Penetration Testing Framework Using Attack Patterns. 135-148 - Nick Walker, Natalie Coull, Robert Ian Ferguson, Allan Milne:
A Method for Resolving Security Vulnerabilities Through the Use of Design Patterns. 149-155 - Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina, Michael E. Locasto, Daniel Bilar:
'Weird Machine' Patterns. 157-171 - Martin Ruskov, Paul Ekblom, M. Angela Sasse:
Towards a Simulation of Information Security Behaviour in Organisations. 177-184 - Paul J. Kearney, David A. Sinclair, Sebastian Wagner:
Security Design Patterns in the MASTER Workbench. 185-197 - Shamal Faily, Simon Parkin, John Lyle:
Evaluating the Implications of Attack and Security Patterns with Premortems. 199-209 - Faye Rona Mitchell:
An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic Context. 215-222 - Renato Cordeiro de Amorim, Peter Komisarczuk:
Partitional Clustering of Malware Using K-Means. 223-233 - Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. 235-245 - Harjinder Singh Lallie, Nathan Griffiths:
Where has this Hard Disk Been?: Extracting Geospatial Intelligence from Digital Storage Systems. 247-255 - Clive Blackwell, Hong Zhu:
Future Directions for Research on Cyberpatterns. 259-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.