共 50 条
- [1] Matching Attack Patterns to Security Patterns Using Neural Networks [J]. PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 9 - 17
- [2] Security Testing Based on Attack Patterns [J]. 2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 4 - 11
- [4] Analysis on Internet Attack and Security [J]. ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2387 - 2390
- [5] Security Analysis of IoT Systems Using Attack Trees [J]. GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2019, 2019, 11720 : 68 - 94
- [6] CubeSat Security Attack Tree Analysis [J]. 8TH IEEE INTERNATIONAL CONFERENCE ON SPACE MISSION CHALLENGES FOR INFORMATION TECHNOLOGY (SMC-IT 2021), 2021, : 68 - 76
- [7] Security attack analysis of safety systems [J]. 2009 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (EFTA 2009), 2009,
- [8] An Overview of Security in CoAP: Attack and Analysis [J]. 2019 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2019, : 655 - 660
- [9] Analysis of Complex Networks for Security Issues using Attack Graph [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
- [10] An Analysis of Cyber Security Attack Taxonomies [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 153 - 161