相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification
Marco Anisetti et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)
FoNAC - An automated Fog Node Audit and Certification scheme
Mudassar Aslam et al.
COMPUTERS & SECURITY (2020)
Applications of machine learning methods for engineering risk assessment - A review
Jeevith Hegde et al.
SAFETY SCIENCE (2020)
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems
Marco Anisetti et al.
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1 (2020)
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process
Kamalanathan Kandasamy et al.
EURASIP JOURNAL ON INFORMATION SECURITY (2020)
Future developments in standardisation of cyber risk in the Internet of Things (IoT)
Petar Radanliev et al.
SN APPLIED SCIENCES (2020)
Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices
Sara N. Matheu-Garcia et al.
COMPUTER STANDARDS & INTERFACES (2019)
Hierarchical Flow Model-Based Impact Assessment of Cyberattacks for Critical Infrastructures
Qianxiang Zhu et al.
IEEE SYSTEMS JOURNAL (2019)
Data-Driven Cybersecurity Incident Prediction: A Survey
Nan Sun et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Security Risk Assessment in Internet of Things Systems
Jason R. C. Nurse et al.
IT PROFESSIONAL (2017)
RiskTeller: Predicting the Risk of Cyber Incidents
Leyla Bilge et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Taxonomy of information security risk assessment (ISRA)
Alireza Shameli-Sendi et al.
COMPUTERS & SECURITY (2016)
From Security to Assurance in the Cloud: A Survey
Claudio A. Ardagna et al.
ACM COMPUTING SURVEYS (2015)
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
Barbara Kordy et al.
COMPUTER SCIENCE REVIEW (2014)
Cloud monitoring: A survey
Giuseppe Aceto et al.
COMPUTER NETWORKS (2013)
DARGOS: A highly adaptable and scalable monitoring architecture for multi-tenant Clouds
Javier Povedano-Molina et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)
Risk analysis in a linguistic environment: A fuzzy evidential reasoning-based approach
Yong Deng et al.
EXPERT SYSTEMS WITH APPLICATIONS (2011)
Toward an Architecture for Monitoring Private Clouds
Shirlei Aparecida de Chaves et al.
IEEE COMMUNICATIONS MAGAZINE (2011)