共 50 条
- [31] Agentless Automation Model for Post Exploitation Penetration Testing INTELLIGENT COMPUTING, INFORMATION AND CONTROL SYSTEMS, ICICCS 2019, 2020, 1039 : 529 - 539
- [32] Model of Automated Control of Telecommunication Layer of the Post-Industrial Society Cyber Environment in the Conditions of External Destructive Influences PROCEEDINGS OF 2019 XXII INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2019, : 48 - 51
- [34] Ecology-Inspired Cyber Risk Model for Propagation of Vulnerability Exploitation in Tactical Edge 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 336 - 341
- [35] Automated model-based image registration for tactical image exploitation AUTOMATED GEO-SPATIAL IMAGE AND DATA EXPLOITATION, 2000, 4054 : 19 - 29
- [36] Shaping Influence and Influencing Shaping: A Computational Red Teaming Trust-Based Swarm Intelligence Model ADVANCES IN SWARM INTELLIGENCE, ICSI 2016, PT I, 2016, 9712 : 14 - 23
- [37] Analysis of the rock mass and terrain surface behaviour in the region of the E 140 cavern in the Borehole Salt Mine "Lezkowice" field, during the post-exploitation backfill process, using FEM and geodetic measurements GOSPODARKA SUROWCAMI MINERALNYMI-MINERAL RESOURCES MANAGEMENT, 2008, 24 (02): : 359 - 369
- [38] A Model of a Malware Infected Automated Guided Vehicle for Experimental Cyber-Physical Security PROCEEDINGS OF SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS) 2016, VOL 2, 2018, 16 : 672 - 688
- [39] Bidding into the red: A model of post-auction bankruptcy JOURNAL OF FINANCE, 2007, 62 (06): : 2695 - 2723