Affiliation:
1. Department of Computer and Radio Communications Engineering, Korea University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference15 articles.
1. [1] F. Yildiz, “Modeling the effects of cyber operations on kinetic battles,” Calhoun: The NPS Institutional Archive DSpace Repository, Dudley Knox Library, Naval Postgraduate School, Monterey, CA, 2014.
2. [2] C. Lala and B. Panda, “Evaluating damage from cyber attacks: A model and analysis,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol.31, no.4, pp.300-310, 2001. 10.1109/3468.935047
3. [3] M.R. Grimaila and L.W. Fortson, “Towards an information asset-based defense cyber damage assessment process,” IEEE Symposium on Computational Intelligence in Security and Defense Applications, Honululu, HI, USA, pp.206-212, 2007. 10.1109/cisda.2007.368155
4. [4] S.J. Yang, J. Holsopple, and M. Sudit, “Evaluating threat assessment for multi-stage cyber attacks,” IEEE Military Communications Conference, Washington, DC, USA, 2006. 10.1109/milcom.2006.302216
5. [5] P.A.S. Ralston, J.H. Graham, and J.L. Hieb, “Cyber security risk assessment for SCADA and DCS networks,” ISA Trans., vol.46, no.4, pp.583-594, 2007. 10.1016/j.isatra.2007.04.003
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献