共 50 条
- [1] From Attacker Models to Reliable Security [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 547 - 547
- [2] Software Security: Vulnerabilities and Countermeasures for Two Attacker Models [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 990 - 999
- [3] Adaptable Authentication Model: Exploring Security with Weaker Attacker Models [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 234 - 247
- [5] Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception [J]. ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 : 179 - 186
- [7] Integrating attacker behavior in IT security analysis: a discrete-event simulation approach [J]. INFORMATION TECHNOLOGY & MANAGEMENT, 2015, 16 (03): : 221 - 233
- [8] Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis [J]. 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 89 - 97