共 83 条
[1]
Accenture, 2020, 3 ANN STAT CYB RES I
[2]
Ahlemann F., 2007, Reference Modeling for Business Systems Analysis, P77, DOI [10.4018/978-1-59904-054-7.ch004, DOI 10.4018/978-1-59904-054-7.CH004]
[3]
Ahrend J.M., 2016, PROC INT C CYBER SIT, P1
[4]
Cyber-Attack Modeling Analysis Techniques: An Overview
[J].
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW),
2016,
:69-76
[5]
[Anonymous], LOCKHEED MARTIN CYBE
[6]
[Anonymous], CHECKPOINT SECURITY
[7]
[Anonymous], 2015, J Big Data, DOI DOI 10.1186/S40537-015-0013-4
[8]
[Anonymous], VIRUSTOTAL YARATHE P
[9]
[Anonymous], VERIS FRAM
[10]
Ardagna C., 2021, ENISA Threat Landscape 2021