共 16 条
- [1] Automated Generation of Attack Graphs Using NVD [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 135 - 142
- [2] Buttigieg R, 2017, I C SCI TECH AUTO CO, P93, DOI 10.1109/STA.2017.8314877
- [3] Checkoway S., 2011, P 20 USENIX C SEC SE, P6
- [4] Currie R., 2017, HACKING CAN BUS BASI
- [5] Security Evaluation of an Airbag-ECU by Reusing Threat Modeling Artefacts [J]. PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 37 - 43
- [6] Gulsever M., 2019, STUDY VULNERABILITIE
- [7] Jajodia Sushil., 2007, ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, P2
- [9] Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 175 - 182
- [10] Kaya K.M., 2019, STUDY VULNERABILITIE