共 74 条
[2]
Akhtar T, 2018, IEEE ICCE
[4]
Anderson B. D., 2007, Optimal control:linear quadratic methods
[5]
[Anonymous], 2023, Threat intelligence report finds malicious IoT botnet based DDOS
[8]
Camacho E.F., 2004, ADV TK CONT SIGN PRO, VSecond
[10]
Spatial-temporal modeling of malware propagation in networks
[J].
IEEE TRANSACTIONS ON NEURAL NETWORKS,
2005, 16 (05)
:1291-1303