共 23 条
- [1] Cao Y.L., Wang X.M., He Z.B., Optimal security strategy for Malware propagation in mobile wireless sensor networks, Acta Electronica Sinica, 44, 8, pp. 1851-1857, (2016)
- [2] Chen S.H., Fan X.G., Zhuo Z.F., Huang J.K., Sun X.M., Ad hoc secure routing protocol based on optimized trust evaluation, Journal of Beijing University of Aeronautics and Astronautics, 42, 11, pp. 2524-2531, (2016)
- [3] Chen Y., Wei Z., Yu Z.T., Huang S.W., Preliminary study on anomaly detection of information network based on the correlation of coupling dynamic discrete event chains, Automation of Electric Power Systems, 40, 17, pp. 38-43, (2016)
- [4] Feng H.F., Bai F.S., Xu Y.J., Urban traffic perception and critical node identification of road network based on trajectory big data, Journal of Transportation Systems Engineering and Information Technology, 30, 11, pp. 40-45, (2018)
- [5] Guo Y., Wang L.J., Liu S., Shared key-based mutual authentication and key agreement schemes in wireless sensor networks, China Science and Technology Paper, 11, 8, pp. 865-868, (2016)
- [6] Hou L.Q., Zhang J.M., Jin N.Z., Li Y., Zhu M., Zhang L., Network attack detection and forensics design for substation process layer and SMV secure transmission, Power System Automation, 40, 17, pp. 87-92, (2016)
- [7] Hu F., Wei X.L., Fan J.H., Sun Q., Interference graph based interference detection algorithm, Computer Engineering, 44, 4, pp. 161-167, (2018)
- [8] Li J., Guo X., Sun J., DDoS attack detection for industrial control systems based on extended Kalman filtering, Application of Electronic Technology, 42, 4, pp. 73-77, (2016)
- [9] Li Y., Huang G.Q., Cao L.X., Zhang B., Li Y., Huang G., Et al., Probability controllability of complex attack networks, Computer Science and Exploration, 10, 10, pp. 1407-1419, (2016)
- [10] Liu Y., Fang Y., Sun H., Liu T., Smart grid attack detection method based on physics-information fuzzy reasoning, China Science and Technology Paper, 11, 14, pp. 1619-1625, (2016)