共 28 条
- [1] Alsiherov Farkhod, 2010, Proceedings of the 12th WSEAS International Conference on Automatic Control, Modelling & Simulation (ACMOS 2010), P434
- [2] [Anonymous], WSEAS T SYST CONTROL
- [3] Balbo G., 2001, Lectures on Formal Methods and Performance Analysis. First EEF/Euro Summer School on Trends in Computer Science. Revised Lectures (Lecture Notes in Computer Science Vol.2090), P84
- [4] Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
- [5] Security and auditing of VPN [J]. THIRD INTERNATIONAL WORKSHOP ON SERVICES IN DISTRIBUTED AND NETWORKED ENVIRONMENTS, PROCEEDINGS, 1996, : 132 - 138
- [6] Brown R., 2010, STUXNET WORM CAUSES
- [8] Dispensa S., 2010, REDUCE MALWARE INDUC
- [10] Hamed H., 2005, ICNP '05: Proceedings of the 13TH IEEE International Conference on Network Protocols, P259