Publisher
Springer Nature Singapore
Reference17 articles.
1. IBM Security and Ponemon Institute: Cost of a Data Breach Report 2020 (2020)
2. Gorenc, B., Sands, F.: Hacker machine interface: the state of SCADA HMI vulnerabilities. TrendLabs Research Paper (2017)
3. Kuhn, K.D., Madanat, S.M.: Robust maintenance policies for markovian systems under model uncertainty. Comput.-Aided Civ. Inf. Eng. 21(3), 171–178 (2006)
4. Sokri, A.: Optimal resource allocation in cyber-security: a game theoretic approach. Procedia Comput. Sci. 134, 283–288 (2018). https://doi.org/10.1016/j.procs.2018.07.172
5. Njilla, L.L., Kamhoua, C.A., Kwiat, K.A., Hurley, P., Pissinou, N.: Cyber security resource allocation: a markov decision process approach. In: IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 49–52 (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献