Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference63 articles.
1. Incorporating attacker capabilities in risk estimation and mitigation;ben Othmane;Comput Secur,2015
2. A survey of insider attack detection research;Salem,2008
3. Common sense guide to mitigating insider threats;Silowash,2012
4. Simulation games platform for unintentional perpetrator attack vector identification;Macak,2020
5. Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks;Nespoli;IEEE Commun Surv Tutor,2018
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy Transfer Using Digital Forensic;2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS);2024-06-28
2. Process security methods and measurement in the context of standard management systems;Engineering Management in Production and Services;2024-06-01
3. Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design;Lecture Notes in Business Information Processing;2024
4. Tech-Business Analytics in Secondary Industry Sector;International Journal of Applied Engineering and Management Letters;2023-10-25
5. Malware Forensics;Malware Analysis and Intrusion Detection in Cyber-Physical Systems;2023-09-26