共 50 条
- [1] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
- [2] Cyber-Attacks - Trends, Patterns and Security Countermeasures [J]. 7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015, 2015, 28 : 24 - 31
- [3] A survey on Classification of Cyber-attacks on IoT and IIoT devices [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 406 - 413
- [4] A Control and Attack Detection Scheme for Fuzzy Systems against Cyber-attacks [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
- [5] Potential Cyber-attacks against Global Oil Supply Chain [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2015,
- [6] Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks [J]. 2019 IEEE 28TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2019, : 1644 - 1649
- [7] Attack-Tolerant Network Control System Based on the Deception for the Cyber-Attacks [J]. 2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), 2015, : 37 - 44
- [8] Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success [J]. 2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
- [10] Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution [J]. 2017 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW) 2017, 2017, : 69 - 74