共 50 条
- [11] Security Requirement for Cyber Attack Traceback NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 653 - 658
- [13] Cyber Security Training A Survey of Serious Games in Cyber Security 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
- [14] Game Based Cyber Security Training: are Serious Games suitable for cyber security training? INTERNATIONAL JOURNAL OF SERIOUS GAMES, 2016, 3 (01): : 53 - 61
- [15] AAG: A Model for Attack Behavior Judgment in CTF-style Cyber Security Training PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 54 - 58
- [16] Automotive Connectivity, Cyber Attack Scenarios and Automotive Cyber Security 2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 635 - 639
- [17] A Data Mining Framework to Predict Cyber Attack for Cyber Security PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 207 - 212
- [18] Cyber Security Risk Assessment of a DDoS Attack INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 183 - 202
- [20] Cyber security basic defenses and attack trends HOMELAND SECURITY TECHNOLOGY CHALLENGES: FROM SENSING AND ENCRYPTING TO MINING AND MODELING, 2008, : 73 - +