Author:
Holm Hannes,Shahzad Khurram,Buschle Markus,Ekstedt Mathias
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Electrical and Electronic Engineering
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review;International Journal of Critical Infrastructure Protection;2024-09
2. Assessing the Vulnerability of Information Security Models to Malware in Networked Applications;2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA);2024-03-15
3. Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow;Proceedings of the 2023 European Symposium on Usable Security;2023-10-16
4. The meta attack language - a formal description;Computers & Security;2023-07
5. University Distributed Computer Network Vulnerability Assessment;2023 IEEE International Conference on Smart Information Systems and Technologies (SIST);2023-05-04