共 43 条
[1]
Ackoff R. L., 1989, J. Appl. Syst. Anal., V16, P3
[2]
Intrusion Detection in Digital Twins for Industrial Control Systems
[J].
2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM),
2020,
:338-343
[4]
Alguliyev R., 2014, 8 IEEE INT C APPL IN, DOI DOI 10.1109/ICAICT.2014.7035946
[5]
Ardagna C., 2021, ENISA threat Landscape 2021
[6]
Atalay M, 2020, 2020 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 & IOT (METROIND4.0&IOT), P435, DOI [10.1109/metroind4.0iot48571.2020.9138264, 10.1109/MetroInd4.0IoT48571.2020.9138264]
[8]
Bridging Knowledge Gaps in Security Analytics
[J].
ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2021,
:98-108
[9]
Boschert S., 2018, P TMCE PALM GRAN CAN, P209, DOI [10.17560/atp.v60i10.2371, DOI 10.17560/ATP.V60I10.2371]