Cited By
View all- Hu XCheng DChen JJin XWu B(2022)Multiontology Construction and Application of Threat Model Based on Adversarial Attack and Defense Under ISO/IEC 27032IEEE Access10.1109/ACCESS.2022.322063710(117955-117972)Online publication date: 2022
- Yeboah-Ofori AIsmail USwidurski TOpoku-Boateng F(2021)Cyber Threat Ontology and Adversarial Machine Learning Attacks: Analysis and Prediction Perturbance2021 International Conference on Computing, Computational Modelling and Applications (ICCMA)10.1109/ICCMA53594.2021.00020(71-77)Online publication date: Jul-2021
- Pastuszuk JBurek PKsiȩżopolski B(2021)Cybersecurity Ontology for Dynamic Analysis of IT SystemsProcedia Computer Science10.1016/j.procs.2021.08.104192(1011-1020)Online publication date: 2021
- Show More Cited By