Author:
Chen Rui,Li Zongzhe,Han Weihong,Zhang Jiawei
Publisher
Springer Nature Singapore
Reference55 articles.
1. Xiong, W., Legrand, E., Åberg, O., Lagerström, R.: Cyber security threat modeling based on the MITRE enterprise ATT&CK Matrix. Softw. Syst. Model. 21(1), 157–177 (2022)
2. Georgiadou, A., Mouzakitis, S., Askounis, D.: Assessing mitre ATT&CK risk using a cyber-security culture framework. Sensors 21(9), 3267 (2021)
3. Thacker, B.H., Riha, D.S., Fitch, S.H., Huyse, L.J., Pleming, J.B.: Probabilistic engineering analysis using the NESSUS software. Struct. Saf. 28(1–2), 83–107 (2006)
4. Samtani, S., Yu, S., Zhu, H., Patton, M., Chen, H.: Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 25–30. IEEE (2016)
5. Zhang, C., et al.: A novel framework design of network intrusion detection based on machine learning techniques. Secur. Commun. Netw. 2021, 1–15 (2021)