共 50 条
- [22] A Game Theoretical Vulnerability Analysis of Adversarial Attack [J]. ADVANCES IN VISUAL COMPUTING, ISVC 2022, PT II, 2022, 13599 : 369 - 380
- [23] Optimal Network Security Strengthening Using Attack-Defense Game Model [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 475 - +
- [24] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118
- [25] ENHANCING INDUSTRIAL CONTROL NETWORK SECURITY THROUGH VULNERABILITY DETECTION AND ATTACK GRAPH ANALYSIS [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 65 - 74
- [27] DG Impact on Investment Deferral: Network Planning and Security of Supply [J]. IEEE POWER AND ENERGY SOCIETY GENERAL MEETING 2010, 2010,
- [28] Attribution Across Cyber Attack Types: Network Intrusions and Information Operations [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 1082 - 1093
- [29] Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection [J]. NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 105 - 119