共 50 条
- [21] Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 280 - 292
- [22] An Overview of Cyber-Attack Vectors on SCADA Systems 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
- [23] Cyber-Attack Detection for Automotive Cyber-Physical Systems BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
- [24] Construction of Damage Path Diagram and Risk Assessment of Cyber-attack on Power Advanced Metering Infrastructure Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2024, 48 (12): : 89 - 99
- [27] A Flow Attack Strategy based on Critical Links for Cyber-attack 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
- [28] Thwarting cyber-attack reconnaissance with inconsistency and deception 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 151 - +
- [29] Telecom links provide cyber-attack route AVIATION WEEK & SPACE TECHNOLOGY, 1999, 151 (19): : 81 - 83
- [30] Counterplanning deceptions to foil cyber-attack plans IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 221 - 228