Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain
暂无分享,去创建一个
[1] Len LaPadula,et al. Secure Computer Systems: A Mathematical Model , 1996 .
[2] Mike O'Leary,et al. Cyber Operations: Building, Defending, and Attacking Modern Computer Networks , 2015 .
[3] Yimin Sun. Research on Security Issues and Protection Strategy of Computer Network , 2015 .
[4] Michael Moon. Digital supply chains for English language learning , 2008 .
[5] Akinori Saitoh. Introduction to Computer Networks , 1992 .
[6] S. Watts. Low-Intensity Computer Network Attack and Self-Defense , 2010, Israel Yearbook on Human Rights, Volume 41 (2011).
[7] M. Iida,et al. Past , 1971, PS: Political Science & Politics.
[8] Beatrice Meini,et al. Numerical methods for structured Markov chains , 2005 .
[9] J. Wyatt. Decision support systems. , 2000, Journal of the Royal Society of Medicine.
[10] Joseph Migga Kizza,et al. Guide to Computer Network Security, 6th Edition , 2024, Texts in Computer Science.
[11] Igor Kotenko,et al. An approach to modeling the decision support process of the security event and incident management based on Markov chains , 2019 .
[12] Igor V. Kotenko,et al. Computer attack modeling and security evaluation based on attack graphs , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).
[13] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[14] A. Quarteroni. Mathematical Models in Science and Engineering , 2009 .
[15] T. Dobre,et al. Chemical engineering : modelling, simulation and similitude , 2007 .
[16] C. Meier,et al. Digital Supply Chain Management Agenda for the Automotive Supplier Industry , 2017 .
[17] Mark Merkow,et al. Information Security: Principles and Practices , 2005 .
[18] Christer Carlsson,et al. Past, present, and future of decision support technology , 2002, Decis. Support Syst..
[19] Sergey V. Belim,et al. Using the decision support algorithms combining different security policies , 2016, 2016 Dynamics of Systems, Mechanisms and Machines (Dynamics).
[20] Petar Todorovic,et al. Markov Processes I , 1992 .
[21] M. Manhart,et al. Markov Processes , 2018, Introduction to Stochastic Processes and Simulation.
[22] Desmond J. Higham,et al. An Algorithmic Introduction to Numerical Simulation of Stochastic Differential Equations , 2001, SIAM Rev..
[23] T. McMillen. Simulation and Inference for Stochastic Differential Equations: With R Examples , 2008 .
[24] Igor Kotenko,et al. Synthesis of Controlled Parameters of Cyber-Physical-Social Systems for Monitoring of Security Incidents in Conditions of Uncertainty , 2018 .
[25] I A Shuvalov,et al. MATHEMATICAL MODEL OF IMPACT OF THREATS ON INFORMATION SYSTEM OF PROCESSING OF PERSONAL INFORMATION , 2013 .
[26] Olga Aksyonova,et al. Application of a decision support system in an industrial enterprise , 2020 .
[27] G. Fitzgerald,et al. 'I. , 2019, Australian journal of primary health.
[28] J. van Leeuwen,et al. Information Security , 2003, Lecture Notes in Computer Science.
[29] Igor V. Kotenko,et al. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[30] Mark Stamp,et al. Information security - principles and practice , 2005 .
[31] Carlos Cid,et al. Are We Compromised? Modelling Security Assessment Games , 2012, GameSec.
[32] Peter Y. A. Ryan,et al. Mathematical Models of Computer Security , 2000, FOSAD.
[33] Jordan Stoyanov,et al. Simulation and Inference for Stochastic Differential Equations: with R Examples , 2011 .