共 12 条
[1]
[Anonymous], 2016, P 24 INT C SOFTW TEL
[2]
Dolatdar E., 2009, WORLD ACAD SCI ENG T, V58, P1186
[4]
A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks
[J].
2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009),
2009,
:326-+
[5]
A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2016, 46 (08)
:1021-1035
[6]
Cyber-Physical Systems Security-A Survey
[J].
IEEE INTERNET OF THINGS JOURNAL,
2017, 4 (06)
:1802-1831
[7]
A Framework of Cyber-Security Protection for Warship Systems
[J].
PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015,
2015,
:17-20
[8]
Maheshwari P., 2016, International Journal of Computer Applications, P7
[9]
Pavlenko E.Yu., 2018, 2018 IEEE IND CYBER
[10]
Combining De Bruijn Graphs, Overlap Graphs and Microassembly for De Novo Genome Assembly
[J].
IZVESTIYA SARATOVSKOGO UNIVERSITETA NOVAYA SERIYA-MATEMATIKA MEKHANIKA INFORMATIKA,
2013, 13 (02)
:10-10