Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A review of cyber security risk assessment methods for SCADA systems
This paper reviews the state of the art in cyber security risk assessment of Supervisory
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …
A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
Cybersecurity for digital manufacturing
Digital manufacturing aims to create highly customizable products with higher quality and
lower costs by integrating Industrial Internet of Things, big data analytics, cloud computing …
lower costs by integrating Industrial Internet of Things, big data analytics, cloud computing …
A master attack methodology for an AI-based automated attack planner for smart cities
America's critical infrastructure is becoming “smarter” and increasingly dependent on highly
specialized computers called industrial control systems (ICS). Networked ICS components …
specialized computers called industrial control systems (ICS). Networked ICS components …
A survey on the usability and practical applications of graphical security models
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
Bilevel programming and applications
A great amount of new applied problems in the area of energy networks has recently arisen
that can be efficiently solved only as mixed‐integer bilevel programs. Among them are the …
that can be efficiently solved only as mixed‐integer bilevel programs. Among them are the …
Dependability and security quantification of an internet of medical things infrastructure based on cloud-fog-edge continuum for healthcare monitoring using …
TA Nguyen, D Min, E Choi… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Rising aggressive virus pandemics urge to conduct studies on dependability and security of
modern computing systems to secure autonomous and continuous operations of healthcare …
modern computing systems to secure autonomous and continuous operations of healthcare …
A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making
The challenge of decision‐making under uncertainty in information security has become
increasingly important, given the unpredictable probabilities and effects of events in the ever …
increasingly important, given the unpredictable probabilities and effects of events in the ever …
Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model
Today's organizations are inherently open and connected, sharing knowledge and ideas in
order to remain innovative. As a result, these organizations are also more vulnerable to …
order to remain innovative. As a result, these organizations are also more vulnerable to …