Perspective: The Cyber Frontier and Infrastructure
暂无分享,去创建一个
[1] Regina R. Clewlow,et al. Disruptive Transportation: The Adoption, Utilization, and Impacts of Ride-Hailing in the United States , 2017 .
[2] M. V. Eeten,et al. A hybrid method for the NCSC cyber security assessment , 2017 .
[3] B. Allenby. The paradox of dominance: The age of civilizational conflict , 2015 .
[4] John Rennie. Ray Kurzweil's slippery futurism , 2010, IEEE Spectrum.
[5] Benjamin Coifman,et al. Comparing INRIX speed data against concurrent loop detector stations over several months , 2014 .
[6] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[7] H. Lipson. Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues , 2002 .
[8] Joan R. Rosés Vendoiro,et al. A Farewell to Alms: A Brief Economic History of the World , 2007 .
[9] Timothy L. Thomas,et al. Russia's Reflexive Control Theory and the Military , 2004 .
[10] H. Morowitz. The phenomenon of man. , 1981, Hospital practice.
[11] Mikhail Chester,et al. Infrastructure as a wicked complex process , 2019, Elementa: Science of the Anthropocene.
[12] F. King. Reflexive Control and Disinformation in Putin's Wars , 2018 .
[13] R. Kurzweil,et al. The law of accelerating returns , 2008 .
[14] Valery Gerasimov,et al. The Value of Science Is in the Foresight: New Challenges Demand Rethinking the Forms and Methods of Carrying out Combat Operations , 2016 .
[15] Yi-Chang Chiu,et al. Development of a behaviorally induced system optimal travel demand management system , 2017, J. Intell. Transp. Syst..
[16] P. Singer,et al. LikeWar: The Weaponization of Social Media , 2018 .
[17] Monika Richter,et al. Cognition In The Wild , 2016 .
[18] Béla Nagy,et al. Superexponential long-term trends in information technology , 2011 .
[19] เถลิงศก โสมทิพย์. THE FIFTH DISCIPLINE The Art & Practice of the Learning Organization , 2012 .
[20] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[21] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[22] C. J. Harwood. The Evolutionary Trajectory ‐ The Growth of Information in the History and Future of Earth , 1999 .
[23] N. Rosenberg,et al. How the West Grew Rich: The Economic Transforma-tion of the Industrial World , 1987 .
[24] Dan Wang,et al. Transforming the Travel Experience: The Use of Smartphones for Travel , 2013, ENTER.
[25] Ragunathan Rajkumar. A Cyber–Physical Future , 2012, Proceedings of the IEEE.
[26] Thomas A. Longstaff,et al. A common language for computer security incidents , 1998 .
[27] Magnus Hjortdal. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence , 2011 .
[28] Braden Allenby,et al. Infrastructure in the Anthropocene: Example of Information and Communication Technology , 2004 .
[29] B. Allenby,et al. Toward adaptive infrastructure: flexibility and agility in a non-stationarity age , 2019 .