Author:
Lee Cher Chye,Tan Teik Guan,Sharma Vishal,Zhou Jianying
Publisher
Springer International Publishing
Reference44 articles.
1. Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 817 (2018)
2. Arghandeh, R., Von Meier, A., Mehrmanesh, L., Mili, L.: On the definition of cyber-physical resilience in power systems. Renew. Sustain. Energy Rev. 58, 1060–1069 (2016)
3. Arguwal, A.: Threat Modeling Methodologies: What is VAST? https://threatmodeler.com/threat-modeling-methodologies-vast/. Accessed March 2021
4. Arslan, B., Ulker, M., Akleylek, S., Sagiroglu, S.: A study on the use of quantum computers, risk assessment and security problems. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–6. IEEE (2018)
5. Arute, F., et al.: Quantum supremacy using a programmable superconducting processor. Nature 574(7779), 505–510 (2019)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献