咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 公安技术
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 6 篇 threat modeling
  • 2 篇 threat propagati...
  • 2 篇 knowledge graph
  • 2 篇 risk assessment
  • 2 篇 cybersecurity
  • 2 篇 multi-source dat...
  • 2 篇 network security
  • 1 篇 threat landscape
  • 1 篇 ontology framewo...
  • 1 篇 regulations
  • 1 篇 ontologies
  • 1 篇 classified prote...
  • 1 篇 policy
  • 1 篇 threat intellige...
  • 1 篇 stochastic petri...
  • 1 篇 absorbing markov...
  • 1 篇 event graph
  • 1 篇 compliance
  • 1 篇 cyber-physical s...
  • 1 篇 threat actors

机构

  • 1 篇 kth royal instit...
  • 1 篇 school of automo...
  • 1 篇 school of comput...
  • 1 篇 rise research in...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 3rd research ins...

作者

  • 2 篇 yunfei han
  • 2 篇 shuqin zhang
  • 2 篇 tianhui du
  • 2 篇 xinyu su
  • 2 篇 peiyu shi
  • 1 篇 fredrik heiding
  • 1 篇 ragha madhavi go...
  • 1 篇 ulrik franke
  • 1 篇 zhao tai
  • 1 篇 olatunde abiona
  • 1 篇 zhang xuan
  • 1 篇 robert lagerstro...
  • 1 篇 jiang lei
  • 1 篇 ren weihong
  • 1 篇 margus valja
  • 1 篇 aparna gadhi
  • 1 篇 hou shuo
  • 1 篇 luo feng
  • 1 篇 yang zhenyu
  • 1 篇 pan wenwen

语言

  • 6 篇 英文
检索条件"主题词=Threat Modeling"
6 条 记 录,以下是1-10 订阅
排序:
threat modeling and Application Research Based on Multi-Source Attack and Defense Knowledge
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 349-377页
作者: Shuqin Zhang Xinyu Su Peiyu Shi Tianhui Du Yunfei Han School of Computer Science Zhongyuan University of TechnologyZhengzhouChina
Cyber threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous *** personnel may be unable to use CTI effectively to understand th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
threat modeling and Risk Assessment in Automotive Domain Based on Stochastic Petri Net
Threat Modeling and Risk Assessment in Automotive Domain Bas...
收藏 引用
2020中国汽车工程学会年会暨展览会
作者: Luo Feng Pan Wenwen Hou Shuo Zhang Xuan Yang Zhenyu School of Automotive Studies Tongji University
To accommodate modern applications,vehicles have become increasingly *** we get benefit from it,the problem of Cybersecurity becomes more and more ***,we have more and more security and privacy challenges for the desi... 详细信息
来源: cnki会议 评论
Automating threat modeling using an ontology framework
收藏 引用
Cybersecurity 2018年 第1期1卷 893-912页
作者: Margus Valja Fredrik Heiding Ulrik Franke Robert Lagerstrom KTH Royal Institute of Technology 10044 StockholmSweden RISE Research Institutes of Sweden 16440 KistaSweden
threat modeling is of increasing importance to IT security,and it is a complex and resource demanding *** aim of automating threat modeling is to simplify model creation by using data that are already ***,the collecte... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cyber Resilience through Real-Time threat Analysis in Information Security
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第4期17卷 51-67页
作者: Aparna Gadhi Ragha Madhavi Gondu Hitendra Chaudhary Olatunde Abiona Department of Computer Information Systems Indiana University Northwest Gary IN USA
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Application Research on Two-Layer threat Prediction Model Based on Event Graph
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3993-4023页
作者: Shuqin Zhang Xinyu Su Yunfei Han Tianhui Du Peiyu Shi School of Computer Science Zhongyuan University of TechnologyZhengzhouHEN037China
Advanced Persistent threat(APT)is now the most common network ***,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT *** cannot provide rapi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
CPIS-compliance Security Requirement Analysis for Software Development
CPIS-compliance Security Requirement Analysis for Software D...
收藏 引用
2015 3rd International Conference on Machinery,Materials and Information Technology Applications(ICMMITA 2015)
作者: Jiang Lei Yuan Jing Ren Weihong Zhao Tai 3rd Research Institute of MPS-Information Classified Security Protection Evaluation Center
China CPIS policy is the fundamental policy of China cybersecurity strategy. Therefore, CPIS-compliance software solution is highly demanded to help organizations comply with CPIS associated policies and standards. In... 详细信息
来源: cnki会议 评论