共 50 条
- [1] Network security modeling and cyber attack simulation methodology INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 320 - 333
- [2] Cyber attack modeling and simulation for network security analysis PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +
- [3] Simulation for training computer network operations PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 329 - 334
- [4] Attribution Across Cyber Attack Types: Network Intrusions and Information Operations IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 1082 - 1093
- [5] Simulation Approach for Military Cyber Operations PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 180 - 187
- [6] An Overview of Cyber-Attack Vectors on SCADA Systems 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
- [7] Cyber-Attack Modeling Analysis Techniques: An Overview 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
- [8] AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 127 : 297 - 308
- [9] Cyber-attack and defense simulation framework JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
- [10] Simulation of a RTU Cyber Attack on a Transformer Bank 2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,