共 63 条
[1]
Deployment Optimization of IoT Devices through Attack Graph Analysis
[J].
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19),
2019,
:192-202
[2]
Ammann P., 2002, Proceedings of 9th ACM Conference on Computer and Communications Security (ACM-CCS 2002), P217, DOI [10.1145/586110.586140, DOI 10.1145/586110.586140]
[3]
[Anonymous], 2017, Attackers Deploy New ICS Attack Framework "TRITON"and Cause Operational Disruption to Critical Infrastructure
[4]
Assante M.J., 2015, The Industrial Control System Cyber Kill Chain
[5]
Barre⠁re M., 2017, 2017 13 INT C NETWOR, P1
[6]
Barrere M., 2023, T CITY CYBER PHYS AT
[9]
Barrère M, 2017, IEEE CONF COMM NETW, P378, DOI 10.1109/CNS.2017.8228667
[10]
Bopche GS, 2014, COMM COM INF SC, V467, P379