作者: Qi Alfred Chen , Yan Chen , Zhenyuan Li , Runqing Yang , Wei Ruan
DOI: 10.1016/J.COSE.2021.102282
关键词: Data collection 、 Information technology 、 Systems architecture 、 Threat model 、 Cyberspace 、 Computer science 、 Selection (linguistics) 、 Data management 、 Data science 、 Software deployment
摘要: With the development of information technology, the border of the cyberspace gets much broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional …