共 50 条
- [41] PROBABILITY ANALYSIS OF THERMAL VULNERABILITY TO NUCLEAR ATTACK [J]. OPERATIONS RESEARCH, 1957, 5 (01) : 146 - 147
- [42] A Game Theoretical Vulnerability Analysis of Adversarial Attack [J]. ADVANCES IN VISUAL COMPUTING, ISVC 2022, PT II, 2022, 13599 : 369 - 380
- [43] Attack and Analysis on The Vulnerability of Tenda Wireless Routers [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5316 - +
- [44] RecGraph: Graph Recovery Attack using Variational Graph Autoencoders [J]. 2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
- [45] Cybersecurity: A Survey of Vulnerability Analysis and Attack Graphs [J]. MATHEMATICS AND COMPUTING (ICMC 2018), 2018, 253 : 97 - 111
- [46] The Optimized Attribute Attack Graph Based on APT Attack Stage Model [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2781 - 2785
- [47] Quantitative assessment for the vulnerability of cyber-physical system based on attack graph [J]. International Journal of Electrical Engineering, 2015, 22 (06): : 201 - 207
- [48] Intelligent model for cyber attack detection and prevention [J]. PROCEEDINGS OF THE ISCA 12TH INTERNATIONAL CONFERENCE INTELLIGENT AND ADAPTIVE SYSTEMS AND SOFTWARE ENGINEERING, 2003, : 5 - 10
- [49] Model Inversion Attack with Least Information and an In-depth Analysis of its Disparate Vulnerability [J]. 2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML, 2023, : 119 - 135
- [50] PAGCL: An unsupervised graph poisoned attack for graph contrastive learning model [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 149 : 240 - 249