共 50 条
- [1] Active cyber attack model for network system's vulnerability assessment [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 153 - +
- [2] Vulnerability Assessment for Communication Network of Substation Automation Systems to Cyber Attack [J]. 2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 1680 - +
- [3] Ranking Cyber Attack Vulnerability of Nodes in Power Transmission Network [J]. 2020 INTERNATIONAL CONFERENCE ON SMART GRIDS AND ENERGY SYSTEMS (SGES 2020), 2020, : 419 - 424
- [4] A Cyber Attack Modeling and Impact Assessment Framework [J]. 2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
- [5] MTD Assessment Framework with Cyber Attack Modeling [J]. 2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 316 - 323
- [7] Network Vulnerability Assessment based on Attack Graph [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
- [8] A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions [J]. KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2574 - 2583
- [9] Network security modeling and cyber attack simulation methodology [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 320 - 333
- [10] Cyber attack modeling and simulation for network security analysis [J]. PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +