共 50 条
- [42] An approach to evaluate network security risk based on attack graph [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 1235 - 1238
- [43] A HOST-BASED SECURITY ASSESSMENT ARCHITECTURE FOR INDUSTRIAL CONTROL SYSTEMS [J]. 2009 2ND INTERNATIONAL SYMPOSIUM ON RESILIENT CONTROL SYSTEMS (ISRCS 2009), 2009, : 7 - 12
- [44] A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 62 - 69
- [45] Automating Safety and Security Risk Assessment in Industrial Control Systems: Challenges and Constraints [J]. 2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,
- [46] DECISION SUPPORT BASED ON THE RISK ASSESSMENT OF INFORMATION SYSTEMS AND BAYESIAN LEARNING [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2014, 21 (03): : 539 - 544
- [47] Decision support based on the risk assessment of information systems and bayesian learning [J]. 1600, Strojarski Facultet (21):
- [49] A Quantitative Method for Evaluating Network Security Based on Attack Graph [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 349 - 358
- [50] Cyber Risk Assessment of Power Control Systems - A Metrics weighed by Attack Experiments [J]. 2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,