Empirical test of a tool for cyber security vulnerability assessment
暂无分享,去创建一个
[1] Daniel E. O'Leary,et al. Expert system verification and validation: a survey and tutorial , 1993, Artificial Intelligence Review.
[2] Al Mannai,et al. Development of a decision support tool to inform resource allocation for critical infrastructure protection in Homeland Security , 2008 .
[3] Marc Fabro. Study on Cyber Security and Threat Evaluation in SCADA Systems , 2012 .
[4] Mathias Ekstedt,et al. A Manual for the Cyber Security Modeling Language (simplified version) , 2013 .
[5] David A. Schmidt,et al. Aggregating vulnerability metrics in enterprise networks using attack graphs , 2013, J. Comput. Secur..
[6] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[7] Khurram Shahzad,et al. P2AMF: Predictive, Probabilistic Architecture Modeling Framework , 2013, IWEI.
[8] Andy Ju An Wang. Information security models and metrics , 2005, ACM-SE 43.
[9] Richard Lippmann,et al. Modeling Modern Network Attacks and Countermeasures Using Attack Graphs , 2009, 2009 Annual Computer Security Applications Conference.
[10] Per Runeson,et al. Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.