共 50 条
- [41] Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 288 - 293
- [43] A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities [J]. Requirements Engineering, 2010, 15 : 41 - 62
- [44] Contagion in cyber security attacks [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (07) : 780 - 791
- [45] On Blockchain Security and Relevant Attacks [J]. 2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2018, : 7 - 12
- [48] Managing Cyber Security Vulnerabilities in Large Networks [J]. Bell Labs Technical Journal, 4 (3-4): : 252 - 272