共 50 条
- [41] A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems COMPANION OF THE 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS-C 2020), 2020, : 426 - 433
- [42] Requirement Analysis of IoT Security in Distributed Systems 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON), 2017, : 777 - 781
- [43] An Analysis for Understanding Software Security Requirement Methodologies 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 141 - 149
- [44] Threat analysis for space information network based on network security attributes: a review Complex & Intelligent Systems, 2023, 9 : 3429 - 3468
- [46] Threat Scenario Dependency-Based Model of Information Security Risk Analysis INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 93 - 102
- [47] Dynamic Threat Weight of Network Security Communication Based on Multisource Data Analysis WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
- [48] Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 383 - 388
- [49] Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree 2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW, 2022, : 375 - 379
- [50] Analysis on the security threat of caisson gravity wharf PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 500 - 505