Author:
Egerton Hugo,Hammoudeh Mohammad,Unal Devrim,Adebisi Bamidele
Reference34 articles.
1. A flow‐based multi‐agent data exfiltration detection architecture for ultra‐low latency networks;Marques R.S.;ACM Transactions on Internet Technology,2020
2. Risk Based Security(2020).2020 Q1 Data Breach Quick View Report. Data Breach Quick View Report.https://pages.riskbasedsecurity.com/en/2020‐q1‐data‐breach‐quickview‐report(accessed 3 June 2020).
3. Threats on the horizon: understanding security th
reats in the era of cyber‐physical systems;Walker‐Roberts S.;The Journal of Supercomputing,2020
4. Preliminaries of orthogonal layered defence using functional and assurance controls in industrial control systems;Mackintosh M.;Journal of Sensor and Actuator Networks,2019
5. Q. Do B. Martini K.‐K. Raymond Choo 2015 74 91
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Zero Trust Security Strategies and Guideline;Digital Transformation in Policing: The Promise, Perils and Solutions;2023