共 50 条
- [2] Present Cyber Threat Management (Methodologies to mitigate evolving cyber-attacks) [J]. 2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 115 - 121
- [3] Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 170 - 178
- [4] Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures [J]. IOT, 2021, 2 (01): : 163 - 186
- [5] Policing Cyber Hate, Cyber Threats and Cyber Terrorism [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
- [6] Research on Cyber Attacks and Defensive Measures of Power Communication Network [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09): : 7613 - 7635
- [8] Trust Issues That Create Threats for Cyber Attacks in Cloud Computing [J]. 2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 900 - 905
- [9] Potential cyber threats of adversarial attacks on autonomous driving models [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023,