Publisher
Springer Nature Switzerland
Reference17 articles.
1. Choi, S., Woo, J., Kim, J., Lee, J.Y.: Digital twin-based integrated monitoring system: korean application cases. Sensors 22, 5450 (2022). https://doi.org/10.3390/s22145450
2. Yang, B., Xin, L., Long, Z.: An improved residual-based detection method for stealthy anomalies on mobile robots. Machines 10, 446 (2022). https://doi.org/10.3390/machines10060446
3. Kotenko, I.V.: Primenenie tekhnologii upravleniya informaciej i sobytiyami bezopasnosti dlya zashchity informacii v kriticheski vazhnyh infrastrukturah. Trudy SPIIRAN Vyp 1, 2–7 (2012)
4. Lavrova, D.S., Zaitseva, E.A., Zegzhda, D.P.: Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time. Autom. Control. Comput. Sci. 53(5), 387–392 (2019). https://doi.org/10.3103/S0146411619050067
5. Stevens, M.: Security Information and Event Management (SIEM). In Proceedings of the NEbraska CERT Conference, Omaha, NE, USA, 9–11 August 2005. http://www.certconf.org/presentations/2005/files/WC4.pdf
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献