咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
  • 2 篇 管理学
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 统计学(可授理学、...

主题

  • 5 篇 threat analysis
  • 2 篇 cyber security
  • 1 篇 risk matrix
  • 1 篇 social engineeri...
  • 1 篇 vehicle lifecycl...
  • 1 篇 assessment proce...
  • 1 篇 mitigation strat...
  • 1 篇 meter vulnerabil...
  • 1 篇 cloud security
  • 1 篇 attack scenarios
  • 1 篇 security operati...
  • 1 篇 data analysis
  • 1 篇 smart meter infr...
  • 1 篇 access control
  • 1 篇 ethi-cal conside...
  • 1 篇 attack model
  • 1 篇 composition and ...
  • 1 篇 knowledge graph
  • 1 篇 risk assessment
  • 1 篇 privacy.

机构

  • 1 篇 beijing key labo...
  • 1 篇 national coaliti...
  • 1 篇 school of transp...
  • 1 篇 hefei innovation...
  • 1 篇 cyber security a...
  • 1 篇 school of electr...
  • 1 篇 registered manag...
  • 1 篇 software school ...
  • 1 篇 school of cyber ...
  • 1 篇 china automotive...

作者

  • 1 篇 jian wang
  • 1 篇 limin sun
  • 1 篇 hongsong zhu
  • 1 篇 hongmao qin
  • 1 篇 yunpeng wang
  • 1 篇 zuoguang wang
  • 1 篇 peipei liu
  • 1 篇 haojie ji
  • 1 篇 yanan zhang
  • 1 篇 steven dougherty
  • 1 篇 yimin sheng
  • 1 篇 haoyang jia
  • 1 篇 sina ahmadi
  • 1 篇 x.sean wang
  • 1 篇 yinghui wang
  • 1 篇 weili han
  • 1 篇 takaki saitoh

语言

  • 5 篇 英文
检索条件"主题词=Threat Analysis"
5 条 记 录,以下是1-10 订阅
排序:
Smart Meter Deployment threat and Vulnerability analysis and Response
收藏 引用
Journal of Energy and Power Engineering 2015年 第2期9卷 199-213页
作者: Steven Dougherty Takaki Saitoh Cyber Security Architect Energy & Utilities Global Center of Competency Global Business Services Sacramento 95814California USA Registered Management Consultant Registered Professional Engineer Global Technology Services Osaka 5340000 Japan
Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabiliti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Systematic Literature Review on Cloud Computing Security: threats and Mitigation Strategies
收藏 引用
Journal of Information Security 2024年 第2期15卷 148-167页
作者: Sina Ahmadi National Coalition of Independent Scholars Seattle United States
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Social engineering in cybersecurity:a domain ontology and knowledge graph application examples
收藏 引用
Cybersecurity 2021年 第1期4卷 480-500页
作者: Zuoguang Wang Hongsong Zhu Peipei Liu Limin Sun School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China Beijing Key Laboratory of IoT Information Security Technology Institute of Information EngineeringChinese Academy of Sciences(CAS)Beijing 100093China
Social engineering has posed a serious threat to cyberspace *** protect against social engineering attacks,a fundamental work is to know what constitutes social *** paper first develops a domain ontology of social eng... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Systematic Risk Assessment Framework of Automotive Cybersecurity
收藏 引用
Automotive Innovation 2021年 第3期4卷 253-261页
作者: Yunpeng Wang Yinghui Wang Hongmao Qin Haojie Ji Yanan Zhang Jian Wang School of Transportation Science and Engineering Beihang UniversityBeijing 100191China School of Electronic and Information Engineering Beihang UniversityBeijing 100191China Hefei Innovation Research Institute Beihang UniversityHefei 230012China China Automotive Technology and Research Center Co. Ltd.Tianjin 300300China
The increasingly intelligent and connected vehicles have brought many unprecedented automotive cybersecurity threats,which may cause privacy breaches,personal injuries,and even national security *** providing effectiv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Data access control in data exchanging supporting big data arena
收藏 引用
Journal of Management Analytics 2018年 第3期5卷 155-169页
作者: Haoyang Jia Yimin Sheng Weili Han X.Sean Wang Software School Fudan UniversityShanghaiPeople’s Republic of China
A big data arena(BDA)is proposed to offer an effective trial-and-error environment for analysis algorithm design and application exploration through the provision of computational resources and intensive *** is expect... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论