共 50 条
- [21] Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks Paradise, Abigail (abigailp@post.bgu.ac.il), 1600, Institute of Electrical and Electronics Engineers Inc., United States (04): : 65 - 79
- [22] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34
- [23] High-Speed Forensic Technology Against Targeted Cyber Attacks ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 946 - 946
- [24] Stealthy Targeted Local Covert Attacks on Cyber-Physical Systems 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3462 - 3467
- [25] MITIGATE: a dynamic supply chain cyber risk assessment methodology Journal of Transportation Security, 2019, 12 : 1 - 35
- [27] Examining How Targeted Cyber Attacks on Critical Supply Chain Networks Can Lead to Economic Collapse and Civil Unrest SOUTHEASTCON 2024, 2024, : 1482 - 1489
- [28] Mitigate software obsolescence and cyber risk using application virtualization EE: Evaluation Engineering, 2018, 57 (12):
- [29] The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment 2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
- [30] Risk assessment for physical and cyber attacks on critical infrastructures MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1961 - 1969