Classification of Logical Vulnerability Based on Group Attacking Method
暂无分享,去创建一个
[1] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[2] Mário M. Freire,et al. Security Challenges of the Internet of Things , 2017 .
[3] Apostolos P. Fournaris,et al. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks , 2017 .
[4] Anthony T. Patera,et al. A Posteriori Error Bounds for the Empirical Interpolation Method , 2010 .
[5] Kishor S. Trivedi,et al. A novel approach for software vulnerability classification , 2017, 2017 Annual Reliability and Maintainability Symposium (RAMS).
[6] Umesh Singh,et al. ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies , 2014 .
[7] Hamid Reza Shahriari,et al. Seven Years of Software Vulnerabilities: The Ebb and Flow , 2017, IEEE Security & Privacy.