共 67 条
[31]
Eckhart Matthias, 2019, J. Internet Serv. Inf. Secur. (JISIS), V9, P52
[32]
European Union Agency for Cybersecurity, 2022, ENISA Threat Landscape 2022: July 2021 to July 2022, DOI DOI 10.2824/764318
[33]
FBI, 2022, 2022 Internet Crime Report, P2023
[35]
A Security Argument Pattern for Medical Device Assurance Cases
[J].
2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW),
2014,
:220-225
[36]
Gov.uk, 2022, The cyber security breaches survey 2022
[37]
IBM, 2022, Cost of a data breach report
[39]
Jagannathan S, 2015, 2015 IEEE SYMPOSIUM ON PRODUCT COMPLIANCE ENGINEERING (ISPCE 2015)
[40]
Ji X, 2016, 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), P693, DOI 10.1109/SNPD.2016.7515980