共 50 条
- [31] Thwarting cyber-attack reconnaissance with inconsistency and deception 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 151 - +
- [32] Telecom links provide cyber-attack route AVIATION WEEK & SPACE TECHNOLOGY, 1999, 151 (19): : 81 - 83
- [33] Counterplanning deceptions to foil cyber-attack plans IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 221 - 228
- [34] Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 481 - 486
- [37] Studying The Impacts of Cyber-attack On Smart Grid 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2015, : 461 - 466
- [38] Predictive model for multistage cyber-attack simulation International Journal of System Assurance Engineering and Management, 2020, 11 : 600 - 613
- [40] Counterplanning deceptions to foil cyber-attack plans IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 203 - 210