共 50 条
- [21] On Cyber-security of Augmentation Networks [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION, 2019, : 408 - 422
- [23] A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed [J]. IEEE ACCESS, 2021, 9 : 16239 - 16253
- [24] On Cyber-Security of Information Systems [J]. DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 201 - 211
- [25] The Science of Social Cyber-Security [J]. MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 459 - 459
- [26] A CYBER-SECURITY STORM MAP [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 93 - 102
- [27] Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach [J]. IEEE ACCESS, 2019, 7 : 146057 - 146069
- [28] Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach [J]. 15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 283 - 288
- [29] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198