共 50 条
- [1] Cyber Security for Middleware System Architectures [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 361 - 365
- [2] REVS: A Vulnerability Ranking Tool for Enterprise Security [J]. ICEIS: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2022, : 126 - 133
- [3] securiCAD by foreseeti A CAD tool for enterprise cyber security management [J]. PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2015), 2015, : 152 - 155
- [4] Cyber Security Vulnerability Detection Using Natural Language Processing [J]. 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 174 - 178
- [6] A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions [J]. KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2574 - 2583
- [7] Cyber Security Threat Modeling of A Telesurgery System [J]. 2020 2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR INDUSTRY 4.0 (STI), 2020,
- [9] Cyber Security Framework for Enterprise System Development: Enhancing Domain Security Through ESM [J]. MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 924 - 929
- [10] Modeling and Assessing the Impact of Security Attacks on Enterprise Information Systems [J]. BUSINESS INFORMATION SYSTEMS WORKSHOPS (BIS 2014), 2014, 183 : 281 - 292