共 36 条
[2]
[Anonymous], P 7 ANN WORKSH CYB S
[3]
[Anonymous], [No title captured]
[4]
Bou-Harb Elias., 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), P1
[5]
Cheng P, 2016, CYBER SECURITY IND C, P133
[6]
Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2016, 46 (03)
:356-369
[7]
Eastman R L., 2015, Big Data and Predictive Analytics: On the Cybersecurity Front Line
[8]
Evers K, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES), P97, DOI 10.1109/ICVES.2017.7991908
[9]
Fudong Li, 2010, Proceedings of the 2010 International Conference on Emerging Security Technologies (EST 2010), P77, DOI 10.1109/EST.2010.26
[10]
Gao Y, 2013, IEEE P 2013 3 INT C, DOI [10.1109/iccsnt.2013.6967062, DOI 10.1109/ICCSNT.2013.6967062]