共 50 条
- [41] Identifying missing relationships of CAPEC attack patterns by transformer models and graph structure 2023 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE VULNERABILITY, SVM, 2023, : 14 - 17
- [44] Automatic Discovery of Attack Messages and Pre- and Post-Conditions for Attack Graph Generation PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 378 - 387
- [45] Fetal monitoring: identifying the relevant biosignals interdependencies 2015 E-HEALTH AND BIOENGINEERING CONFERENCE (EHB), 2015,
- [47] Identifying, understanding, and analyzing critical infrastructure interdependencies IEEE Control Systems Magazine, 2001, 21 (06): : 11 - 25
- [49] Identifying, understanding, and analyzing critical infrastructure interdependencies IEEE CONTROL SYSTEMS MAGAZINE, 2001, 21 (06): : 11 - 25
- [50] A Survey on Deep Graph Generation: Methods and Applications LEARNING ON GRAPHS CONFERENCE, VOL 198, 2022, 198