共 50 条
- [1] From Attacker Models to Reliable Security [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 547 - 547
- [2] Incorporating attacker behavior in stochastic models of security [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 79 - 85
- [3] Software Security: Vulnerabilities and Countermeasures for Two Attacker Models [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 990 - 999
- [4] Introducing GAMfIS: A Generic Attacker Model for Information Security [J]. 2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 393 - 398
- [5] Exploring Security and Authentication Issues in Internet of Things [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 673 - 678
- [7] Adding authentication to model driven security [J]. ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2006, : 585 - +
- [8] An authentication model for multilevel security domains [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1534 - 1539
- [9] Grid Cyber-Security Strategy in an Attacker-Defender Model [J]. 2020 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2020,