共 23 条
[1]
Al Ghazo A.T., 2018, Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy, P3
[2]
A2G2V: Automatic Attack Graph Generation and Visualization and Its Applications to Computer and SCADA Networks
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2020, 50 (10)
:3488-3498
[3]
Al Ghazo AT, 2019, 2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM)
[4]
Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2018, 48 (02)
:207-223
[5]
Alhomidi M., 2013, Computer Applications Technology (ICCAT), 2013 International Conference on, P1
[6]
[Anonymous], 2019, SEC WAT TREATM TES
[7]
[Anonymous], 2018, About us
[8]
[Anonymous], 2017, Belknap Press of Harvard University Press Publ.
[9]
[Anonymous], 2018, MOR 40 ICS COMP WER
[10]
Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2016, 46 (03)
:356-369