共 17 条
[1]
[Anonymous], 2020, IND INTERNET PLATFOR
[3]
Eirini A., 2021, J CYBERSECUR, V7
[4]
Firoz Noor Farjana, 2020, Cyber Security and Computer Science. Second EAI International Conference, ICONCS 2020. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 325), P14, DOI 10.1007/978-3-030-52856-0_2
[6]
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 108 (1230-1240)
:1230-1240
[9]
Menachem D., 2020, P FUTURE TECHNOLOGIE, P889, DOI [10.1007/978-3-030-63092-8_60, DOI 10.1007/978-3-030-63092-8_60]
[10]
Meng W., 2020, J PARALLEL DISTR COM, V112, P2023