-
1
-
-
84962499012
-
Cyber stealth attacks in critical information infrastructures
-
Cazorla, L., Alcaraz, C., Lopez, J.: Cyber stealth attacks in critical information infrastructures. IEEE Syst. J. 12(2), 1778–1792 (2018)
-
(2018)
IEEE Syst. J.
, vol.12
, Issue.2
, pp. 1778-1792
-
-
Cazorla, L.1
Alcaraz, C.2
Lopez, J.3
-
2
-
-
84986247560
-
A comprehensive study on apt attacks countermeasures for future networks communications: Challenges solutions
-
Singh, S., Sharma, P.K., Moon, S.Y., Moon, D., Park, J.H.: A comprehensive study on apt attacks countermeasures for future networks communications: challenges solutions. J. Supercomput. 1–32 (2016). https://doi.org/10.1007/s11227-016-1850-4
-
(2016)
J. Supercomput.
, vol.1
, pp. 32
-
-
Singh, S.1
Sharma, P.K.2
Moon, S.Y.3
Moon, D.4
Park, J.H.5
-
3
-
-
85029509042
-
Preventing advanced persistent threats in complex control networks
-
Foley, S.N., Gollmann, D., Snekkenes, E. (eds.), Springer, Cham
-
Rubio, J.E., Alcaraz, C., Lopez, J.: Preventing advanced persistent threats in complex control networks. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 402–418. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9 22
-
(2017)
ESORICS 2017. LNCS
, vol.10493
, pp. 402-418
-
-
Rubio, J.E.1
Alcaraz, C.2
Lopez, J.3
-
4
-
-
0016072062
-
Structural controllability
-
Lin, C.-T.: Structural controllability. IEEE Trans. Autom. Control 19(3), 201–208 (1974)
-
(1974)
IEEE Trans. Autom. Control
, vol.19
, Issue.3
, pp. 201-208
-
-
Lin, C.-T.1
-
5
-
-
0036662438
-
Domination in graphs applied to electric power networks
-
Haynes, T.W., Hedetniemi, S.M., Hedetniemi, S.T., Henning, M.A.: Domination in graphs applied to electric power networks. SIAM J. Discret. Math. 15(4), 519–529 (2002)
-
(2002)
SIAM J. Discret. Math.
, vol.15
, Issue.4
, pp. 519-529
-
-
Haynes, T.W.1
Hedetniemi, S.M.2
Hedetniemi, S.T.3
Henning, M.A.4
-
6
-
-
33644926401
-
Parameterized power domination complexity
-
Kneis, J., Mölle, D., Richter, S., Rossmanith, P.: Parameterized power domination complexity. Inf. Process. Lett. 98(4), 145–149 (2006)
-
(2006)
Inf. Process. Lett.
, vol.98
, Issue.4
, pp. 145-149
-
-
Kneis, J.1
Mölle, D.2
Richter, S.3
Rossmanith, P.4
-
7
-
-
84875705321
-
The power grid as a complex network: A survey
-
Pagani, G.A., Aiello, M.: The power grid as a complex network: a survey. Phys. A: Stat. Mech. Appl. 392(11), 2688–2700 (2013)
-
(2013)
Phys. A: Stat. Mech. Appl.
, vol.392
, Issue.11
, pp. 2688-2700
-
-
Pagani, G.A.1
Aiello, M.2
-
8
-
-
0032482432
-
Collective dynamics of ‘small-world’ networks
-
Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393(6684), 440 (1998)
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440
-
-
Watts, D.J.1
Strogatz, S.H.2
-
9
-
-
0011697225
-
Opinion dynamics and bounded confidence models, analysis, and simulation
-
Hegselmann, R., Krause, U., et al.: Opinion dynamics and bounded confidence models, analysis, and simulation. J. Artif. Soc. Soc. Simul. 5(3), 1–33 (2002)
-
(2002)
J. Artif. Soc. Soc. Simul.
, vol.5
, Issue.3
, pp. 1-33
-
-
Hegselmann, R.1
Krause, U.2
-
10
-
-
85029364817
-
Survey of publicly available reports on advanced persistent threat actors
-
Lemay, A., Calvet, J., Menet, F., Fernandez, J.M.: Survey of publicly available reports on advanced persistent threat actors. Comput. Secur. 72, 26–59 (2018)
-
(2018)
Comput. Secur.
, vol.72
, pp. 26-59
-
-
Lemay, A.1
Calvet, J.2
Menet, F.3
Fernandez, J.M.4
-
11
-
-
78650062267
-
-
February 2011, Accessed Apr 2018
-
Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier, version 1.4, February 2011. https://www.symantec.com. Accessed Apr 2018
-
W32.Stuxnet Dossier, Version 1.4
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
15
-
-
85052244318
-
-
Accessed Apr 2018
-
MITRE Corporation. MITRE ATT&CK (2018). https://attack.mitre.org. Accessed Apr 2018
-
MITRE ATT&CK (2018
-
-
-
16
-
-
84907351844
-
A study on advanced persistent threats
-
Decker, B., Zúquete, A. (eds.), Springer, Heidelberg
-
Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats. In: De Decker, B., Zúquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 63–72. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44885-4_5
-
(2014)
CMS 2014. LNCS
, vol.8735
, pp. 63-72
-
-
Chen, P.1
Desmet, L.2
Huygens, C.3
-
17
-
-
84905692209
-
Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains
-
Hutchins, E.M., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inf. Warf. Secur. Res. 1(1), 80 (2011)
-
(2011)
Lead. Issues Inf. Warf. Secur. Res.
, vol.1
, Issue.1
, pp. 80
-
-
Hutchins, E.M.1
Cloppert, M.J.2
Amin, R.M.3
-
18
-
-
85029435558
-
Analysis of intrusion detection systems in industrial ecosystems
-
Rubio, J.E., Alcaraz, C., Roman, R., Lopez, J.: Analysis of intrusion detection systems in industrial ecosystems. In: 14th International Conference on Security and Cryptography, pp. 116–128 (2017)
-
(2017)
14Th International Conference on Security and Cryptography
, pp. 116-128
-
-
Rubio, J.E.1
Alcaraz, C.2
Roman, R.3
Lopez, J.4
|