共 50 条
- [31] A Survey of Cyber Attack Detection Systems INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (05): : 1 - 10
- [34] Secret Sharing Schemes with Three or Four Minimal Qualified Subsets Designs, Codes and Cryptography, 2005, 34 : 17 - 34
- [37] Secret Sharing Schemes for (k, n)-Consecutive Access Structures CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 463 - 480
- [38] New constructions of (2,n)-threshold secret sharing schemes using exclusive-OR operations 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 837 - 842
- [40] Cyber-Attack Detection for Automotive Cyber-Physical Systems BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215