共 50 条
- [41] A Verifiable Conformance Relationship between Smart Card Applets and B Security Models ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 237 - +
- [42] A Security Threat Analysis and Evaluation Model for Power Field Operation Terminal 2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 382 - 385
- [43] A Threat Model-Driven Security Testing Approach for Web Application CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 158 - 168
- [45] A Threat Model and Security Recommendations for IoT Sensors in Connected Vehicle Networks 2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
- [46] Persistent information security - Beyond the e-commerce threat model 2006 ICEC: Eighth International Conference on Electronic Commerce, Proceedings: THE NEW E-COMMERCE: INNOVATIONS FOR CONQUERING CURRENT BARRIERS, OBSTACLES AND LIMITATIONS TO CONDUCTING SUCCESSFUL BUSINESS ON THE INTERNET, 2006, : 271 - 277
- [47] TOM: A Threat Operating Model for Early Warning of Cyber Security Threats ADVANCED DATA MINING AND APPLICATIONS, ADMA 2019, 2019, 11888 : 696 - 711
- [48] A hierarchical evaluation approach for network security based on threat spread model Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (06): : 945 - 954
- [49] Cyber Security: Threat Detection Model based on Machine learning Algorithm PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 239 - 243
- [50] Autonomous Driving Security: A Comprehensive Threat Model of Attacks and Mitigation Strategies 2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,