Publisher
Springer Nature Switzerland
Reference39 articles.
1. ISO 31000:2018. Risk management—Guidelines. https://www.iso.org/obp/ui/en/#iso:std:iso:31000:ed-2:v1:en. Accessed 12 July 2023
2. ISO/IEC 27005:2022(en). Information security, cybersecurity and privacy protection–Guidance on managing information security risks. https://www.iso.org/obp/ui/en/#iso:std:iso-iec:27005:ed-4:v1:en. Accessed 12 July 2023
3. Pacheco, J., Benitez, V., Félix, L.: Anomaly behavior analysis for IoT network nodes. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, pp. 1–6. ACM Press, Paris (2019)
4. Kavallieratos, G., Spathoulas, G., Katsikas, S.: Cyber risk propagation and optimal selection of cybersecurity controls for complex cyberphysical systems. Sensors 21(5), e1691 (2021)
5. Naqash, T., Shah, S.H., Islam, M.N.U.: Statistical analysis based intrusion detection system for ultra-high-speed software defined network. Int. J. Parallel Prog. 50(1), 89–114 (2022)