共 50 条
- [1] Critical Infrastructure Cyber-Security Risk Management [J]. TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 59 - 76
- [2] On Cyber-Security of Information Systems [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
- [3] Cyber-Security and Governance for ICS/SCADA in South Africa [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 241 - 251
- [5] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
- [6] A Framework of Cyber-Security Protection for Warship Systems [J]. PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, : 17 - 20
- [7] Virtual Cyber-Security Testing Capability for large scale distributed information infrastructure protection [J]. 2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 372 - +
- [8] Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations [J]. RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS, 10TH IFIP WG 8.9 WORKING CONFERENCE, CONFENIS 2016, 2016, 268 : 127 - 141
- [9] Cyber-Security Issues in Healthcare Information Technology [J]. Journal of Digital Imaging, 2017, 30 : 117 - 125