Publisher
Springer Nature Switzerland
Reference23 articles.
1. Jeong, J., Mihelcic, J., Oliver, G., Rudolph, C.: Towards an improved understanding of human factors in cybersecurity. In: IEEE 2019: Proceedings of the 1st International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, pp. 338–345. IEEE, Piscataway (2019)
2. Hurst, W., Shone, N., Monnet, Q.: Predicting the effects of DDoS attacks on a network of critical infrastructures. In: IEEE 2015: Proceedings of the International Conference on Computer and Information Technology, UK (2015)
3. Wang, H., Chen, Z., Zhao, J., Di, X., Liu, D.: A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow, pp. 8599–8609. IEEE (2018)
4. Alperin, K.B., Wollaber, A.B., Gomez, S.R.: Improving interpretability for cyber vulnerability assessment using focus and context visualizations. In: Proceedings of ViZSec, 2020, USA, pp. 30–30. IEEE (2020)
5. ISO/IEC 27002:2017-06, 2017: Information technology-Security techniques- Code of practice for information security controls, Beuth Verlag, Berlin, Germany (2017)