共 12 条
- [1] [黄慧萍 Huang Huiping], 2015, [计算机应用研究, Application Research of Computers], V32, P3022
- [2] [黄家辉 Huang Jiahui], 2016, [自动化学报, Acta Automatica Sinica], V42, P792
- [3] Security assessment for industrial control systems based on fuzzy analytic hierarchy process [J]. Feng, Dong-Qin (dqfeng@iipc.zju.edu.cn), 1600, Zhejiang University (50): : 759 - 765
- [4] Johnson R.E., 2010, INT TECHN SEC T ICIT, P1
- [5] Scarfone K, 2009, EMP SOFTW ENG MEAS 2
- [6] Sener E, 2013, HYDROGEOL J, V21, P701, DOI 10.1007/s10040-012-0947-y
- [8] Stouffer Keith, 2011, Security NIST Special Publication, V800, P16
- [9] Vintr Z, 2012, INT CARN CONF SECU, P59, DOI 10.1109/CCST.2012.6393538
- [10] Cyber Security Risk Assessment for Industrial Automation Platform [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 341 - 344