共 50 条
- [21] A Novel Information Fusion Model for Assessment of Malware Threat [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 1 - 15
- [23] Construction Project Risk Assessment Model [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON ENGINEERING AND RISK MANAGEMENT, 2011, : 42 - 45
- [24] Safety Risk Assessment of Power Construction Project Based on the Vulnerability [J]. 2ND INTERNATIONAL CONFERENCE ON NEW ENERGY AND RENEWABLE RESOURCES (ICNERR 2017), 2017, : 108 - 112
- [25] RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network [J]. TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 295 - 303
- [26] Access Graph Based Risk Assessment Model for Network Information System [J]. FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 42 - 48
- [27] Security Vulnerability Analysis Assessment Method of Power Information Network [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 372 - 380
- [28] Effective Network Vulnerability Assessment through Model Abstraction [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 17 - +
- [29] Semi-Automated Threat, Vulnerability & Risk Assessment (TVRA) for Medical Devices [J]. 17TH ACM INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS, PETRA 2024, 2024, : 687 - 693
- [30] Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks [J]. DEFENCE AND SECURITY ANALYSIS, 2023, 39 (01): : 111 - 117