Have a personal or library account? Click to login
A Cyber Threat Model of a Nation Cyber Infrastructure Based on Goel-Okumoto Port Approach Cover

A Cyber Threat Model of a Nation Cyber Infrastructure Based on Goel-Okumoto Port Approach

Open Access
|May 2018

References

  1. Barron, E. (2013). Game Theory, an Introduction, Second Edition, ch. 3., John Wiley & Sons, Inc.10.1002/9781118547168
  2. Heriyanto, T., & Allen, L. (2014). Kali Linux: Assuring Security by Penetration Testing, Birmingham: Packt Publishing.10.1016/S1353-4858(14)70077-7
  3. Min Xie Yuan-Shun Dai, & K.-L. Poh. (2004). Computing System Reliability Models and Analysis, Kluwer Academic Publishers, 101-104.
  4. Moga, H., & Boşcoianu, M. (2015). Massive Cyber-attacks Patterns Implemented with BDI Agents, 6th International Conference on Aerospace, Robotics, Manufacturing Systems, Mechanical Systems, Mechanical Engineering, Biomechatronics and Neurorehabilitation (Applied Mechanics and Materials. OPTIROB, ICAEM, ICREB 2015), Vol. 811, 383-389.10.4028/www.scientific.net/AMM.811.383
  5. Moga, H., & Boşcoianu, M. (2016). Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures, Applied Mechanics and Materials, IACSIT/IACT/UASTRO OPTIROB, 97-104.10.4028/www.scientific.net/AMM.841.97
  6. Moga, H., & Ogîgău-Neamțiu, F. (2017). Modelarea amenințării cibernetice interstatale utilizând evaluarea polieuristică a deciziilor, In Managementul situațiilor de risc în contextul crizelor de securitate, Sibiu: Editura Academiei Forțelor Terestre „Nicolae Bălcescu”.
  7. Ogîgău-Neamțiu, F., & Moga, H. (2017). Profilul psihologic al războinicului cibernetic și hackerului non-statal bazat pe matricea de decizie polieuristică, In Managementul situațiilor de risc în contextul crizelor de securitate, Sibiu: Editura Academiei Forțelor Terestre „Nicolae Bălcescu”.
  8. Poisel, R. A. (2013). Information Warfare and Electronic Warfare Systems, In Artech House Electronic Warfare Library, ch. 4, 107-139, Boston, London: Artech House Publishers.
  9. Pritchett, W. L., & Smet, D. (2013). Kali Linux Cookbook. Birmingham: Packt Publishing.
  10. Warden, J. A. (2000). The Enemy as a System, available at: http://www.ciar.org/ttk/mbt/strategy.Warden.enemy-as-a-system.html.
DOI: https://doi.org/10.2478/raft-2018-0010 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 75 - 87
Published on: May 11, 2018
In partnership with: Paradigm Publishing Services

© 2018 Florin Ogîgău-Neamțiu, Horațiu Moga, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.