Participatory Modelling of Information Technology Equipment Vulnerability Using Causal Loop Analysis
Author:
Publisher
Springer International Publishing
Link
https://link.springer.com/content/pdf/10.1007/978-3-031-17629-6_28
Reference17 articles.
1. DeSmit, Z., Elhabashy, A.E., Wells, L.J., Camelio, J.A.: Cyber-physical vulnerability assessment in manufacturing systems. Procedia Manuf. 5, 1060–1074 (2016). https://doi.org/10.1016/j.promfg.2016.08.075
2. Ten, C.-W., Liu, C.-C., Govindarasu, M.: Vulnerability assessment of cybersecurity for SCADA systems using attack trees. In: 2007 IEEE Power Engineering Society General Meeting, June, pp. 1–8 (2007). https://doi.org/10.1109/PES.2007.385876
3. Hutchins, M.J., Bhinge, R., Micali, M.K., Robinson, S.L., Sutherland, J.W., Dornfeld, D.: Framework for identifying cybersecurity risks in manufacturing. Procedia Manuf. 1, 47–63 (2015). https://doi.org/10.1016/j.promfg.2015.09.060
4. Chen, S.Y., Macredie, R.: Web-based interaction: a review of three important human factors. Int. J. Inf. Manag. 30(5), 379–387 (2010). https://doi.org/10.1016/j.ijinfomgt.2010.02.009
5. Anderson, R.: Emission security. In: Security Engineering a Guide to Building Dependable Distributed Systems, 3rd ed., p. 645 Wiley (2020)
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3