Open Access

A Cyber Threat Model of a Nation Cyber Infrastructure Based on Goel-Okumoto Port Approach


Cite

Barron, E. (2013). Game Theory, an Introduction, Second Edition, ch. 3., John Wiley & Sons, Inc.10.1002/9781118547168Search in Google Scholar

Heriyanto, T., & Allen, L. (2014). Kali Linux: Assuring Security by Penetration Testing, Birmingham: Packt Publishing.10.1016/S1353-4858(14)70077-7Search in Google Scholar

Min Xie Yuan-Shun Dai, & K.-L. Poh. (2004). Computing System Reliability Models and Analysis, Kluwer Academic Publishers, 101-104.Search in Google Scholar

Moga, H., & Boşcoianu, M. (2015). Massive Cyber-attacks Patterns Implemented with BDI Agents, 6th International Conference on Aerospace, Robotics, Manufacturing Systems, Mechanical Systems, Mechanical Engineering, Biomechatronics and Neurorehabilitation (Applied Mechanics and Materials. OPTIROB, ICAEM, ICREB 2015), Vol. 811, 383-389.10.4028/www.scientific.net/AMM.811.383Search in Google Scholar

Moga, H., & Boşcoianu, M. (2016). Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures, Applied Mechanics and Materials, IACSIT/IACT/UASTRO OPTIROB, 97-104.10.4028/www.scientific.net/AMM.841.97Open DOISearch in Google Scholar

Moga, H., & Ogîgău-Neamțiu, F. (2017). Modelarea amenințării cibernetice interstatale utilizând evaluarea polieuristică a deciziilor, In Managementul situațiilor de risc în contextul crizelor de securitate, Sibiu: Editura Academiei Forțelor Terestre „Nicolae Bălcescu”.Search in Google Scholar

Ogîgău-Neamțiu, F., & Moga, H. (2017). Profilul psihologic al războinicului cibernetic și hackerului non-statal bazat pe matricea de decizie polieuristică, In Managementul situațiilor de risc în contextul crizelor de securitate, Sibiu: Editura Academiei Forțelor Terestre „Nicolae Bălcescu”.Search in Google Scholar

Poisel, R. A. (2013). Information Warfare and Electronic Warfare Systems, In Artech House Electronic Warfare Library, ch. 4, 107-139, Boston, London: Artech House Publishers.Search in Google Scholar

Pritchett, W. L., & Smet, D. (2013). Kali Linux Cookbook. Birmingham: Packt Publishing.Search in Google Scholar

Warden, J. A. (2000). The Enemy as a System, available at: http://www.ciar.org/ttk/mbt/strategy.Warden.enemy-as-a-system.html.Search in Google Scholar