Publisher
Springer International Publishing
Reference19 articles.
1. Ackoff, L.: From data to wisdom. J. Appl. Syst. Anal. 16(1), 3–9 (1989)
2. Arauz, T., Chanfreut, P., Maestre, J.M.: Cyber-security in networked and distributed model predictive control. Ann. Rev. Control 53, 338–355 (2022). https://doi.org/10.1016/j.arcontrol.2021.10.005
3. Baroni, P., Cerutti, F., Fogli, D., Giacomin, M., Gringoli, F., Guida, G., Sullivan, P.: Self-aware effective identification and response to viral cyber threats. In: 13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, May 25–28, 2021, pp. 353–370 (2021). https://doi.org/10.23919/CyCon51939.2021.9468294
4. Baroni, P., Cerutti, F., Fogli, D., Giacomin, M., Gringoli, F., Guida, G., Sullivan, P.: Self-aware effective identification and response to viral cyber threats. In: 2021 13th International Conference on Cyber Conflict (CyCon), pp. 353–370 (2021). https://doi.org/10.23919/CyCon51939.2021.9468294
5. Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. Technical Report. ADA586960, Center For Cyber Intelligence Analysis and Threat Research Hanover Md (2013)