共 17 条
[1]
Keys under doormats: mandating insecurity by requiring government access to all data and communications
[J].
JOURNAL OF CYBERSECURITY,
2015, 1 (01)
:69-79
[2]
[Anonymous], 2016, 2016 11 SYSTEM SYSTE, DOI DOI 10.1109/SYSOSE.2016.7542961
[4]
Defense Advanced Research Projects Agency (DARPA), 2015, RAP ATT DET IS CHAR
[5]
Department of Defense and General Services Administration (GSA), 2013, IMPR CYB RES ACQ, P1
[6]
Hannula J. -M., 2016, IEEE ANTENNAS WIREL
[8]
Big Data for Cyber Physical Systems An Analysis of Challenges, Solutions and Opportunities
[J].
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS),
2014,
:376-380
[9]
Multics security evaluation: Vulnerability analysis
[J].
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2002,
:127-146
[10]
Kumar K. Mahesh, 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), P1, DOI 10.1109/ISCO.2015.7282319