共 50 条
- [33] Overview of Threat Intelligence Sharing and Exchange in Cybersecurity Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2052 - 2065
- [34] Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks IEEE ACCESS, 2021, 9 : 126789 - 126800
- [35] Assessing Employees' Cybersecurity Attitude Based on Working and Cybersecurity Threat Experience AFRICAN JOURNAL OF INFORMATION SYSTEMS, 2023, 15 (03): : 206 - 221
- [36] Modeling and simulation of air defense threat based on artificial potential field Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2010, 32 (02): : 338 - 341
- [37] From TARA to Test: Automated Automotive Cybersecurity Test Generation Out of Threat Modeling 7TH ACM COMPUTER SCIENCE IN CARS SYMPOSIUM, CSCS 2023, 2023,
- [38] A Threat Hunting Framework for Industrial Control Systems IEEE ACCESS, 2021, 9 : 164118 - 164130
- [39] Attack Tactic Labeling for Cyber Threat Hunting 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 34 - +