Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Developing Defense Strategies from Attack Probability Trees in Software Risk Assessment
Esche, Marko, Toro, Federico Grasso
Published in 2020 15th Conference on Computer Science and Information Systems (FedCSIS) (01.09.2020)
Published in 2020 15th Conference on Computer Science and Information Systems (FedCSIS) (01.09.2020)
Get full text
Conference Proceeding
Journal Article
Distributed State Estimation for Nonlinear Dynamical Networks With Stochastic Topological Structures Subject to Random Deception Attacks and Bit-Rate Constraints
Hu, Jun, Xu, Bing, Caballero-Aguila, Raquel, Jia, Chaoqing, Dong, Hongli
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.06.2025)
Published in IEEE transactions on systems, man, and cybernetics. Systems (01.06.2025)
Get full text
Journal Article
Event-triggered sliding mode control for networked T–S fuzzy delayed systems against random injection attacks
Liu, Hao, Hu, Jun, Zhang, Hongxu, Zuo, Zhiyuan
Published in Journal of the Franklin Institute (01.12.2024)
Published in Journal of the Franklin Institute (01.12.2024)
Get full text
Journal Article
Appetite for self-destruction: suicidal biting as a nest defense strategy in Trigona stingless bees
Shackleton, Kyle, Toufailia, Hasan Al, Balfour, Nicholas J., Nascimento, Fabio S., Alves, Denise A., Ratnieks, Francis L. W.
Published in Behavioral ecology and sociobiology (01.02.2015)
Published in Behavioral ecology and sociobiology (01.02.2015)
Get full text
Journal Article
Delay-dependent impulsive synchronization control for coupled dynamic networks under hybrid cyberattack
Zhang, Lingzhong, Lu, Jianquan, Jiang, Bangxin, Ruan, Qihua, Lou, Jungang
Published in Nonlinear dynamics (01.05.2025)
Published in Nonlinear dynamics (01.05.2025)
Get full text
Journal Article
Attack Detection and Distributed Filtering for State-Saturated Systems Under Deception Attack
Li, Li, Yang, Huan, Xia, Yuanqing, Zhu, Cui
Published in IEEE transactions on control of network systems (01.12.2021)
Published in IEEE transactions on control of network systems (01.12.2021)
Get full text
Journal Article
Impulsive synchronization control for dynamic networks subject to double deception attacks
Zhang, Lingzhong, Lu, Jianquan, Jiang, Bangxin, Zhong, Jie
Published in Expert systems with applications (01.10.2024)
Published in Expert systems with applications (01.10.2024)
Get full text
Journal Article
Formalization of Software Risk Assessment Results in Legal Metrology Based on ISO/IEC 18045 Vulnerability Analysis
Esche, Marko, Salwiczek, Felix, Toro, Federico Grasso
Published in Annals of Computer Science and Information Systems (01.09.2019)
Published in Annals of Computer Science and Information Systems (01.09.2019)
Get full text
Conference Proceeding
Journal Article
Performance, reliability and security risks of glazing subject to explosive blast loading
Stewart, Mark G, Netherton, Michael D
Published in Australian journal of structural engineering (01.01.2007)
Get full text
Published in Australian journal of structural engineering (01.01.2007)
Journal Article
Performance, Reliability and Security Risks of Glazing Subject to Explosive Blast Loading
Stewart, Mark G, Netherton, Michael D
Published in Australian journal of structural engineering (01.01.2006)
Published in Australian journal of structural engineering (01.01.2006)
Get full text
Journal Article