共 50 条
- [4] Cyber-attack group analysis method based on association of cyber-attack information [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
- [6] Understanding of Cyber-Attack Vulnerabilities During Natural Disasters and Discussing A Cyber-Attack Resiliency Framework [J]. SOUTHEASTCON 2024, 2024, : 466 - 471
- [7] From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks [J]. Evolving Systems, 2020, 11 : 479 - 490
- [8] A Flow Attack Strategy based on Critical Links for Cyber-attack [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
- [10] Optimal Linear Cyber-Attack on Remote State Estimation [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13