共 16 条
- [1] Bazilevych K., 2018, International Journal of Computing, V17, P153, DOI [10.47839/ijc.17.3.1035, DOI 10.47839/IJC.17.3.1035]
- [2] Chumachenko D., 2019, Telecommunications and Radio Engineering, V78, P443
- [3] Chumachenko D, 2018, 2018 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA STREAM MINING & PROCESSING (DSMP), P415, DOI 10.1109/DSMP.2018.8478602
- [4] Chumachenko D, 2018, 2018 14TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET), P192, DOI 10.1109/TCSET.2018.8336184
- [5] DEVANEY R, 2004, DIFFERENTIAL EQUATIO
- [6] SET COVERINGS AND TOLERANCE RELATIONS [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2008, 44 (03) : 333 - 340
- [7] KEPHART JO, 1993, 1993 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P2
- [8] Demystifying Cyber-Physical Malware [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 544 - 545