共 50 条
- [32] Incorporating attacker behavior in stochastic models of security [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 79 - 85
- [33] Imitative Attacker Deception in Stackelberg Security Games [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 528 - 534
- [34] Using Discrete Event Simulation to Model Attacker Interactions with Cyber and Physical Security Systems [J]. COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 221 - 226
- [35] The security model to combine the corporate and information security [J]. TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 305 - 316
- [37] Information security management model [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 654 - 657
- [38] An information model for security integration [J]. 11TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2007, : 41 - +
- [40] An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 178 - 188