RIoTS: Risk Analysis of IoT Supply Chain Threats
暂无分享,去创建一个
[1] Daniele Sgandurra,et al. Hierarchical, model-based risk management of critical infrastructures , 2009, Reliab. Eng. Syst. Saf..
[2] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[3] Barbara Kordy,et al. DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..
[4] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[5] Nadya Bartol,et al. Supply Chain Risk Management Practices for Federal Information Systems and Organizations , 2015 .
[6] Vaidas Matuzas,et al. Analysis of large fault trees based on functional decomposition , 2011, Reliab. Eng. Syst. Saf..
[7] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[8] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[9] Gary B. Wills,et al. Towards Mapping the Security Challenges of the Internet of Things (IoT) Supply Chain , 2018, KES.
[10] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[11] Marco Gribaudo,et al. Exploiting Bayesian Networks for the Analysis of Combined Attack Trees , 2015, PASM.
[12] David A. Schmidt,et al. Aggregating vulnerability metrics in enterprise networks using attack graphs , 2013, J. Comput. Secur..
[13] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] Eric R. Ziegel,et al. System Reliability Theory: Models, Statistical Methods, and Applications , 2004, Technometrics.
[15] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[16] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[17] Robert Lagerström,et al. Threat modeling - A systematic literature review , 2019, Comput. Secur..