Understanding Cyber Threats and Vulnerabilities
暂无分享,去创建一个
[1] Pride Russell,et al. Non-Binding Guidelines - For Application of the Council Directive on the Identification and Designation of European Critical Infrastructure and the Assessment of the Need to Improve Their Protection , 2008 .
[2] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] Norbert Wiener,et al. Cybernetics: Control and Communication in the Animal and the Machine. , 1949 .
[4] H.A.M. Luiijf. Process Control Security in the Cybercrime Information Exchange NICC , 2009 .
[5] Eric A. M. Luiijf,et al. Empirical findings on European critical infrastructure dependencies , 2010, Int. J. Syst. Syst. Eng..
[6] Eric A. M. Luiijf,et al. Extensible threat taxonomy for critical infrastructures , 2008, Int. J. Crit. Infrastructures.
[7] Mark M. Pollitt,et al. Cyberterrorism — fact or fancy? , 1998 .
[8] Andrew Colarik. Cyber Terrorism: Political and Economic Implications , 2006 .