攻擊樹 (Chinese Wikipedia)

Analysis of information sources in references of the Wikipedia article "攻擊樹" in Chinese language version.

refsWebsite
Global rank Chinese rank
1st place
1st place
8,888th place
6,251st place
14th place
18th place
2,548th place
1,984th place
6th place
4th place
75th place
140th place
low place
low place
low place
low place

amenaza.com

  • Terrance R Ingoldsby, Amenaza Technologies Limited, Attack Tree-based Threat Risk Analysis, A vendor white paper, Archived copy (PDF). [2012-04-09]. (原始内容存档 (PDF)于2016-03-04). 

archive.org

archive.today

iastate.edu

powercyber.ece.iastate.edu

  • Chee-Wooi Ten, Chen-Ching Liu, Manimaran Govindarasu, Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees, Archived copy (PDF). [2012-04-04]. (原始内容 (PDF)存档于2010-06-30). 

innovativedecisions.com

  • Donald L Buckshaw, Gregory S Parnell, Willard L Ulkenholz, Donald L Parks, James M Wallner, O. Sami Saydjari, Mission Oriented Design Analysis of Critical Information Systems, Military Operations Research V10, N2, 2005, [1][永久失效連結]

nasa.gov

elibrary.gsfc.nasa.gov

schneier.com

  • Schneier, Bruce. Attack Trees. Dr Dobb's Journal, v.24, n.12. December 1999 [2007-08-16]. (原始内容存档于6 August 2007). 
  • Chris Salter, O. Sami Saydjari, Bruce Schneier, Jim Wallner, Toward a Secure System Engineering Methodology, Archived copy (PDF). [2012-04-04]. (原始内容 (PDF)存档于2011-06-23). 

web.archive.org

  • Chee-Wooi Ten, Chen-Ching Liu, Manimaran Govindarasu, Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees, Archived copy (PDF). [2012-04-04]. (原始内容 (PDF)存档于2010-06-30). 
  • Schneier, Bruce. Attack Trees. Dr Dobb's Journal, v.24, n.12. December 1999 [2007-08-16]. (原始内容存档于6 August 2007). 
  • Chris Salter, O. Sami Saydjari, Bruce Schneier, Jim Wallner, Toward a Secure System Engineering Methodology, Archived copy (PDF). [2012-04-04]. (原始内容 (PDF)存档于2011-06-23). 
  • Fault Tree Handbook with Aerospace Applications (PDF). [2019-02-26]. (原始内容 (PDF)存档于2016-12-28). 
  • Terrance R Ingoldsby, Amenaza Technologies Limited, Attack Tree-based Threat Risk Analysis, A vendor white paper, Archived copy (PDF). [2012-04-09]. (原始内容存档 (PDF)于2016-03-04).