共 50 条
- [1] Scenario-based threat detection and attack analysis [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 279 - 282
- [3] Comparison of scenario-based software architecture evaluation methods [J]. 11TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 600 - 607
- [4] An Experience with Three Scenario-Based Methods: Evaluation and Comparison [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (01): : 180 - 185
- [7] A scenario-based approach to protocol design using evolutionary techniques [J]. APPLICATIONS OF EVOLUTIONARY COMPUTING, 2004, 3005 : 178 - 187
- [8] A case study on participatory redesign of Web site with scenario-based techniques [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, : 161 - 166
- [9] Scenario-Based Insider Threat Detection From Cyber Activities [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03): : 660 - 675