共 30 条
[1]
Lahcen M., Caulkins R.A., Mohapatra B., Review and insight on the behavioral aspects of cybersecurity, Cybersecurity, 3, 10, (2020)
[2]
Bendovschi A., Cyber Attacks – trends, patterns and security countermeasures, Proc. Econ. Finance, 28, pp. 24-31, (2015)
[3]
Muiyuro A., Cybersecurity Metrics, Supporting accurate and timely decision-making, Cybersecurity Metrics & Dashboards, pp. 1-25, (2018)
[4]
Swanson M., Bartol N., Sabato J., Hash J., Graffo L., Security Metrics Guide for Information Technology Systems, NIST Spec. Publ., 800-55, (2003)
[5]
Quigley K., Roy J., Cyber-security and risk management in an interoperable world: an examination of governmental action in North America, Social Science Computer Review, 30, 1, pp. 83-94, (2011)
[6]
El Mrabet Z., Kaabouch N., El Ghazi H., El Ghazi H., Cyber-security in smart grid: Survey and challenges, Comput. Electr. Eng., 67, pp. 469-482, (2018)
[7]
Yang C., Xu J., Liang S., DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection, Cybersecurity, 4, 16, (2021)
[8]
Black P.E., Scarfone K., M., Souppaya: Cyber security metrics and measures, Handbook of Science and Technology for Homeland Security, 5, pp. 1-10, (2008)
[9]
Pendleton M., Lebron R.G., Cho J.H., (2017)
[10]
Moitra S.D., Data needs for Network security metrics: A measure and manage approach, ISSA Journal, pp. 31-36, (2012)