共 50 条
- [1] An Overview of Cyber-Attack Vectors on SCADA Systems [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
- [3] An Analysis of Cyber Security Attack Taxonomies [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 153 - 161
- [4] Cyber-attack group analysis method based on association of cyber-attack information [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
- [5] Cyber Attack Grammars for Risk/Cost Analysis [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 597 - 605
- [7] Breakpoints: An Analysis of Potential Hypervisor Attack Vectors [J]. 2013 PROCEEDINGS OF IEEE SOUTHEASTCON, 2013,
- [8] Risk Analysis of Cyber Physical Distribution Network Operation Considering Cyber Attack [J]. Dianwang Jishu/Power System Technology, 2019, 43 (07): : 2345 - 2352
- [9] Towards a framework for cyber attack impact analysis of electric cyber physical systems [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2017, : 638 - 643
- [10] Cyber-Attack Risks Analysis Based on Attack-Defense Trees [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678