Author:
Zhao Angxiao,Gu Zhaoquan,Jia Yan,Feng Wenying,Yang Jianye,Zhang Yanchun
Funder
the Major Key Project of PCL
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference47 articles.
1. Wei, S., Jia, Y., Gu, Z., Shafiq, M., Wang, L.: Extracting novel attack strategies for industrial cyber-physical systems based on cyber range. IEEE Syst. J. (2023)
2. Davis, R., Shrobe, H., Szolovits, P.: What is a knowledge representation? AI Mag. 14(1), 17 (1993)
3. Fensel, D., Şimşek, U., Angele, K., Huaman, E., Kärle, E., Panasiuk, O., Toma, I., Umbrich, J., Wahler, A., Fensel, D., et al.: Introduction: what is a knowledge graph? Knowledge graphs: Methodology, tools and selected use cases, 1–10 (2020)
4. Aleroud, A., Zhou, L.: Phishing environments, techniques, and countermeasures: A survey. Comput. Secur. 68, 160–196 (2017)
5. Gupta, S., Gupta, B.B.: Cross-site scripting (xss) attacks and defense mechanisms: classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manag. 8, 512–530 (2017)