共 50 条
- [1] Recommendations for Effective Cyber Security Execution 2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 342 - 346
- [2] Effective Belief Network for Cyber Security Frameworks INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 221 - 227
- [3] Cyber Security Assistant:Design Overview 2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 313 - 317
- [4] Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 38 - 46
- [5] Cyber range design framework for cyber security education and training International Journal of Information Security, 2023, 22 : 1005 - 1027
- [7] The Design and Application of a Unified Ontology for Cyber Security INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 23 - 41
- [8] Application of HAZOP to the Design of Cyber Security Experiments IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 790 - 799
- [9] Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 20 - 33
- [10] EXPLORING THE EFFECT OF TRAINING ON REALIZING EFFECTIVE CYBER-SECURITY INTED2017: 11TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2017, : 9762 - 9762