共 50 条
- [1] A Comprehensive Approach for Network Security [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 420 - 426
- [2] A Novel Comprehensive Network Security Assessment Approach [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
- [7] Case Study: Information Flow Resilience of a Retail Company with Regard to the Electricity Scenarios of the Sicherheitsverbundsubung Schweiz (Swiss Security Network Exercise) SVU 2014 [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 159 - 170
- [8] How Good is a Security Policy against Real Breaches? A HIPAA Case Study [J]. 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 530 - 540
- [9] The Docker Security Playground: a hands-on approach to the study of Network Security [J]. 2017 PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS (IPTCOMM), 2017,
- [10] A Comprehensive Approach for Validation of Air Traffic Management Security Prototypes A Case Study [J]. 2017 IEEE/AIAA 36TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2017,