相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Optimising user security recommendations for AI-powered smart-homes
Emma Scott et al.
2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022) (2022)
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles
Sakshyam Panda et al.
IEEE ACCESS (2022)
Bayesian Stackelberg games for cyber-security decision support
Yunxiao Zhang et al.
DECISION SUPPORT SYSTEMS (2021)
Game-Theoretic Decision Support for Cyber Forensic Investigations
Antonia Nisioti et al.
SENSORS (2021)
Automated Cyber and Privacy Risk Management Toolkit
Gustavo Gonzalez-Granadillo et al.
SENSORS (2021)
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations
Antonia Nisioti et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
A budgeted maximum multiple coverage model for cybersecurity planning and management
Kaiyue Zheng et al.
IISE TRANSACTIONS (2019)
Post-incident audits on cyber insurance discounts
Sakshyam Panda et al.
COMPUTERS & SECURITY (2019)
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
M. H. R. Khouzani et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2019)
An Options Approach to Cybersecurity Investment
Michail Chronopoulos et al.
IEEE ACCESS (2018)
An Enhanced Cyber Attack Attribution Framework
Nikolaos Pitropakis et al.
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (2018)
Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making
Michel Benaroch
INFORMATION SYSTEMS RESEARCH (2018)
A resource allocation framework for adaptive video streaming over LTE
Satish Kumar et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
A review of cyber security risk assessment methods for SCADA systems
Yulia Cherdantseva et al.
COMPUTERS & SECURITY (2016)
Decision support approaches for cyber security investment
Andrew Fielder et al.
DECISION SUPPORT SYSTEMS (2016)
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming
Hussain M. J. Almohri et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)
The impact of information sharing on cybersecurity underinvestment: A real options perspective
Lawrence A. Gordon et al.
JOURNAL OF ACCOUNTING AND PUBLIC POLICY (2015)
Concerns, Challenges, and Directions of Development for the Issue of Representing Uncertainty in Risk Assessment
Roger Flage et al.
RISK ANALYSIS (2014)
Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
Saurabh Amin et al.
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2013)