共 50 条
- [1] Network Security Threats Situation Assessment and Analysis Technology Study [J]. PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 643 - 646
- [2] Network Security Threats Situation Assessment and Analysis Technology Study [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 217 - 224
- [3] The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 107 - 117
- [4] A Virtual Network Topology Security Assessment Process [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 974 - 979
- [5] Problem of Network Security Threats [J]. 3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, 2010, : 436 - 443
- [6] An Investigation on Cyber Security Threats and Security Models [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
- [7] Bot armies as threats to network security [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2007, 2007, 6570
- [8] GENERALIZED NETWORK TOPOLOGY PROGRAM FOR REAL-TIME SECURITY ASSESSMENT [J]. IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1978, 97 (04): : 1012 - 1012
- [9] Security Analysis of Topology Structure of Electric Power Communication Network [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 76 - 79
- [10] Analysis of Security and Threat of Underwater Wireless Sensor Network Topology [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334