UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Defending against the Advanced Persistent Threat: An Optimal Control Approach Journal article
SECURITY AND COMMUNICATION NETWORKS, 2018
Authors:  Li, Pengdeng;  Yang, Xiaofan;  Xiong, Qingyu;  Wen, Junhao;  Tang, Yuan Yan
Favorite | View/Download:28/0 | TC[WOS]:11 TC[Scopus]:14 | Submit date:2018/10/30
Defending against advanced persistent threat: A risk management perspective Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Authors:  Zhong X.;  Yang L.-X.;  Yang X.;  Xiong Q.;  Wen J.;  Tang Y.Y.
Favorite | View/Download:7/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Advanced persistent threat  APT response problem  Game theory  Risk assessment  Risk management  State evolution model  
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats Journal article
IEEE Access, 2017,Volume: 5,Page: 20111-20123
Authors:  Yang, Lu-Xing;  Li, Pengdeng;  Yang, Xiaofan;  Tang, Yuan Yan
Favorite | View/Download:23/0 | TC[WOS]:22 TC[Scopus]:28 | Submit date:2018/10/30
Cyberspace  Security  Measurement  Nonlinear Dynamical Systems  Stability  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View | Adobe PDF | Favorite | View/Download:1669/387 | TC[WOS]:233 TC[Scopus]:297 | Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid