Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of moving target defenses for network security
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …
account for the attacker's inherent advantage present due to the static nature of network …
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
[HTML][HTML] Connected and autonomous vehicles: A cyber-risk classification framework
The proliferation of technologies embedded in connected and autonomous vehicles (CAVs)
increases the potential of cyber-attacks. The communication systems between vehicles and …
increases the potential of cyber-attacks. The communication systems between vehicles and …
Taxonomy of information security risk assessment (ISRA)
A Shameli-Sendi, R Aghababaei-Barzegar… - Computers & …, 2016 - Elsevier
Abstract Information is a perennially significant business asset in all organizations.
Therefore, it must be protected as any other valuable asset. This is the objective of …
Therefore, it must be protected as any other valuable asset. This is the objective of …
Security vulnerabilities in healthcare: an analysis of medical devices and software
The integration of IoT in healthcare has introduced vulnerabilities in medical devices and
software, posing risks to patient safety and system integrity. This study aims to bridge the …
software, posing risks to patient safety and system integrity. This study aims to bridge the …
Security events and vulnerability data for cybersecurity risk estimation
Current industry standards for estimating cybersecurity risk are based on qualitative risk
matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other …
matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other …
Comparing vulnerability severity and exploits using case-control studies
(US) Rule-based policies for mitigating software risk suggest using the CVSS score to
measure the risk of an individual vulnerability and act accordingly. A key issue is whether …
measure the risk of an individual vulnerability and act accordingly. A key issue is whether …
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth
Recent innovations in the smart city domain have led to the proposition of a new mode of
transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways …
transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways …
Can the common vulnerability scoring system be trusted? a bayesian analysis
The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for
assessing software vulnerabilities. However, it has been criticized for lack of validity and …
assessing software vulnerabilities. However, it has been criticized for lack of validity and …
Assessing cyber risk in cyber-physical systems using the ATT&CK framework
Autonomous transport is receiving increasing attention, with research and development
activities already providing prototype implementations. In this article we focus on …
activities already providing prototype implementations. In this article we focus on …