共 50 条
- [31] IT security modeling SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 502 - 505
- [32] Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
- [33] Security Evaluation of an Airbag-ECU by Reusing Threat Modeling Artefacts PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 37 - 43
- [34] A distributed simulation framework for modeling cyber attacks and the evaluation of security measures SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2014, 90 (09): : 1071 - 1102
- [35] Fast network attack modeling and security evaluation based on attack graphs 1600, River Publishers (03): : 27 - 46
- [36] CBR (Case-Based Reasoning) Evaluation Modeling for Security Risk Analysis in Information Security System SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 66 - 70
- [37] A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach COMPUTER JOURNAL, 2013, 56 (04): : 422 - 439
- [38] Modeling the Security Ecosystem - The Dynamics of (In)Security ECONOMICS OF INFORMATION SECURITY AND PRIVACY, 2010, : 79 - +
- [39] A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity 2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF, 2023, : 372 - 387
- [40] A formal method for modeling and evaluation of protocols of electronic documents transfer and their security on the web EUROMEDIA '2006, 2006, : 98 - +