Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees
暂无分享,去创建一个
[1] Chen-Ching Liu,et al. Multiple hypotheses and their credibility in on-line fault diagnosis , 2001 .
[2] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[3] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[4] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[5] Massoud Amin. North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? , 2003, IEEE Secur. Priv..
[6] G.N. Ericsson,et al. Management of information security for an electric power Utility-on security domains and use of ISO/IEC17799 standard , 2005, IEEE Transactions on Power Delivery.
[7] R. Power. CSI/FBI computer crime and security survey , 2001 .