共 28 条
- [1] Bencsath B., Pek G., Buttyan L., Felegyhazi M., Duqu: a Stuxnet-like malware found in the wild, Technical report, (2011)
- [2] Cohen F., Computer viruses. Ph.D. thesis, University of Southern California, (1985)
- [3] Cooke R.M., Goossens L.H.J., Expert judgment elicitation for risk assessments of critical infrastructures, J Risk Res, 7, 6, pp. 643-656, (2004)
- [4] Coulthard A., Vuori T.A., Computer viruses: a quantitative analysis, Logist Inf Manag, 15, 5-6, pp. 400-409, (2002)
- [5] Cutter S.L., Barnes L., Berry M., Burton C., Evans E., Tate E., Webb J., A place-based model for understanding community resilience to natural disasters, Glob Environ Change, 18, 4, pp. 598-606, (2008)
- [6] Eusgeld I., Kroger W., Sansavini G., Schlapfer M., Zio E., The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures, Reliab Eng Syst Saf, 94, 5, pp. 954-963, (2009)
- [7] Ezell B.C., Infrastructure vulnerability assessment model (I-VAM), Risk Anal, 27, 3, pp. 571-583, (2007)
- [8] Filiol E., Helenius M., Zanero S., Open problems in computer virology, J Comput Virol, 1, 3-4, pp. 55-66, (2006)
- [9] Garnett O., Mandelbaum A., Reiman M., Designing a call center with impatient customers, Manuf Serv Oper Manag, 4, 3, (2002)
- [10] Haldar K., Mishra B.K., A mathematical model for a distributed attack on targeted resources in a computer network, Commun Nonlinear Sci Numer Simulat, 19, pp. 3149-3160, (2014)