共 57 条
[1]
Ahmed M, Panda S, Xenakis C, Panaousis E., MITRE ATT & CK-driven cyber risk assessment, 17th International conference on availability, reliability and security, (2022)
[2]
Andrew BWM, Katsikeas S, Hacks S., GitHub
[3]
mal-lang/icsLang, (2022)
[4]
Awuson-David K., Facilitate security event monitoring and logging of operational technology (OT) legacy systems, International conference of reliable information and communication technology, (2022)
[5]
Awuson-David K, Al-Hadhrami T, Alazab M, Shah N, Shalaginov A., BCFL logging: an approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem, Future Generation Computer Systems, 122, (2021)
[6]
Bakirtzis G, Simon B, Collins A, Fleming C, Elks C., Data-driven vulnerability exploration for design phase system analysis, IEEE Systems Journal, 14, 4, (2020)
[7]
Baybutt P., A critique of the Hazard and Operability (HAZOP) study, Journal of Loss Prevention in the Process Industries, 33, (2015)
[8]
Bronk C, Tikk-Ringas E., The cyber attack on Saudi Aramco, Survival, Global Politics and Strategy, 55, 2, (2013)
[9]
Butler M, Howard G, Colley J, Sassone V., A methodology for assuring the safety and security of critical infrastructure based on STPA and Event-B, International Journal of Critical Computer-Based Systems, 9, (2019)
[10]
The Architecture Analysis & Design Language (AADL): an introduction, (2006)