共 9 条
[1]
Ho Q.D., Le-Ngoc T., Smart grid communications networks: Wireless technologies, protocols, issues and standards, Handbook of Green Information and Communication Systems, pp. 115-146, (2012)
[2]
Jin B., Lin J.J., Review of intrusion detection technology, J. East China Univ. Sci. Technol., 1, pp. 45-46, (2010)
[3]
Kiewitz C., Restubog S.L.D., Zagenczyk T.J., Scott K.D., Garcia P.R.J.M., Tang R.L., Sins of the parents: Self-control as a buffer between supervisors' previous experience of family undermining and subordinates' perceptions of abusive supervision, Leadership Q., 23, pp. 869-882, (2012)
[4]
Lin M.J., Qian H.L., Intrusion detection system: Principle, intrusion hiding and countermeasures, Microelectron. Comput, 31, pp. 102-103, (2011)
[5]
Liu R.S., Meng X.H., Design and implementation of identity authentication system based on PKI, Manuf. Automation, 20, pp. 112-113, (2013)
[6]
Lu H.Q., Wang F., Song Y., The damage assessment system based on combating simulation, J. PLA Univ. Sci. Technol., 10, pp. 139-143, (2011)
[7]
Pu Y.F., Zhang W., Teng S.H., Du H.L., The cooperative network intrusion detection based on decision tree, J. Jiangxi Normal Univ. (Nat. Sci. Edn), 34, pp. 302-307, (2010)
[8]
Wang H.M., Zhang Y., Research on the model of joint operations simulation situation data, J. Syst. Simul., 20, pp. 4186-4188, (2011)
[9]
Xu Z.M., He J., The design and implementation of battlefield situation 3D graphics simulation system, Comput. Appl., 29, pp. 313-316, (2011)