共 50 条
- [31] Deployment Optimization of Defense Stations in an Attack-Defense Aerial War Game [J]. APPLIED SCIENCES-BASEL, 2022, 12 (21):
- [32] Cyber-Attack Risks Analysis Based on Attack-Defense Trees [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
- [34] Modelling Attack-defense Trees Using Timed Automata [J]. FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, FORMATS 2016, 2016, 9884 : 35 - 50
- [35] Attack-Defense Utility Quantification And Security Risk Assessment [J]. 2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1456 - 1461
- [36] On Quantitative Analysis of Attack-Defense Trees with Repeated Labels [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 325 - 346
- [37] Design Method for Virtual Network Attack and Defense Platform [J]. CONFERENCE ON MODELING, IDENTIFICATION AND CONTROL, 2012, 3 : 335 - 340
- [38] A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees [J]. SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 138 - 153
- [40] Anti-ship Missile Attack-Defense Confrontation Ability Verification Technology Based on Simulation [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1227 - +