共 19 条
- [1] [Anonymous], WHITE PAPER 6 KEY RI
- [2] [Anonymous], 2019, PENETRATION TESTING
- [4] COBRA: A hybrid method for software cost estimation, benchmarking, and risk assessment [J]. PROCEEDINGS OF THE 1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1998, : 390 - 399
- [7] CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection [J]. 2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 346 - 353
- [8] Practical attack graph generation for network defense [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
- [9] Jufri M. T., 2018, P 2ND INT C INFORMAT
- [10] Automated Reaction based on Risk Analysis and Attackers Skills in Intrusion Detection Systems [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 117 - +