Author:
Kotenko Igor,Saenko Igor,Lauta Oleg
Publisher
Springer International Publishing
Reference33 articles.
1. Abraham, S., & Nair, S. (2015). A predictive framework for cyber security analytics using attack graphs. International Journal of Computer Networks & Communications (IJCNC), 7(1), 1–17.
2. Ahuja, S. P. (1998). COMNET III: A network simulation laboratory environment for a course in communications networks. In 28th Annual Frontiers in Education Conference (FIE ‘98) (vol. 3, pp. 1085–1088)
3. Bartol, N., Bates, B., Goertzel, K. M., & Winograd, T. (2009). Measuring cyber security and information assurance, Information Assurance Technology Analysis Center. https://www.csiac.org/wp-content/uploads/2016/02/cybersecurity.pdf
4. Bengio, Y., Thibodeau-Laufer, E., Alain, G., & Yosinski, J. (2014). Deep generative stochastic networks trainable by backprop. http://arxiv.org/abs/1306.1091
5. Bocchini, P., Frangopol, D. M., Ummenhofer, T., & Zinke, T. (2014). Resilience and sustainability of civil infrastructure: Toward a unified approach. Journal of Infrastructure Systems, 20, 04014004.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献