Probabilistic modeling and analysis of sequential cyber‐attacks
Author:
Affiliation:
1. Department of Electrical and Computer EngineeringUniversity of Massachusetts Dartmouth Massachusetts
Publisher
Wiley
Link
https://onlinelibrary.wiley.com/doi/pdf/10.1002/eng2.12065
Reference72 articles.
1. LiuS LiuY.Network security risk assessment method based on HMM and attack graph model. In: Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing (SNPD);2016;Shanghai China.
2. TaylorH.Biggest cybersecurity threats in 2016.CNBC.http://www.cnbc.com/2015/12/28/biggest-cybersecurity-threats-in-2016.html. Accessed November2019.
3. EscuderoC SicardF ZamaiE.Process‐aware model based IDSs for industrial control systems cybersecurity: approaches limits and further research. In: Proceedings of the IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA);2018;Turin Italy.
4. ZetterK.Sony got hacked hard: what we know and don't know so far.https://www.wired.com/2014/12/sony-hack-what-we-know/. Accessed November2019.
5. GoelV PerlrothN.Yahoo says 1 billion user accounts were hacked.https://www.theguardian.com/technology/2016/dec/14/yahoo-hack-security-of-one-billion-accounts-breached. Accessed November2019.
Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A comparative study of numerical methods for reliability assessment based on semi-Markov processes;Reliability Engineering & System Safety;2024-12
2. A Private Semi-Markov Model as a Tool to Reduce the Complexity of the Task of Assessing the Stability of the Functioning of Elements of the Information Infrastructure Exposed to Threats;Informatics and Automation;2024-05-28
3. Modeling and Simulation of IoT Botnet Behaviors Using DEVS;2022 13th International Conference on Information and Communication Systems (ICICS);2022-06-21
4. Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation;International Journal of Mathematical, Engineering and Management Sciences;2021-04-01
5. A behavior‐driven reliability modeling method for complex smart systems;Quality and Reliability Engineering International;2021-01-28
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3