共 35 条
- [1] Schneier B., Secrets and lies: digital security in a networked world, (2015)
- [2] Ben-Asher N., Gonzalez C., Effects of cyber security knowledge on attack detection, Comput Hum Behav, 48, pp. 51-61, (2015)
- [3] Zimmermann V., Renaud K., Moving from a“human-as-problem”to a“human-as-solution”cybersecurity mindset, Int J Hum Comput Stud, 131, pp. 169-187, (2019)
- [4] Kendrick C., Frohnmaier M., Georges M., Audio-visual recipe guidance for smart kitchen devices, Proceedings of the Fourth International Conference on Natural Language and Speech Processing, pp. 257-261
- [5] Loukas G., Cyber-Physical Attacks, (2015)
- [6] Dietz M., Vielberth M., Pernul G., Integrating digital twin security simulations in the security operations center, Proceedings of the 15Th International Conference on Availability, Reliability and Security (ARES), pp. 1-9, (2020)
- [7] Towards security-aware virtual environments for digital twins, Proceedings of the 4Th ACM Workshop on Cyber-Physical System security—CPSS ’18, pp. 61-72, (2018)
- [8] Vielberth M., Bohm F., Fichtinger I., Pernul G., Security operations center: a systematic study and open challenges, IEEE Access, 8, pp. 227756-227779, (2020)
- [9] Schneier B., Click here to kill everybody: security and survival in a hyper-connected world, (2018)
- [10] Chen T.M., Sanchez-Aarnoutse J.C., Buford J., Petri net modeling of cyber-physical attacks on smart grid, IEEE Trans Smart Grid, 2, 4, pp. 741-749, (2011)