共 35 条
[2]
Ani U D., Int Conf Cyber Secur Prot Digit Serv Cyber Secur 2020, P2020, DOI [10.1109/CyberSecurity49315.2020.9138886, DOI 10.1109/CYBERSECURITY49315.2020.9138886]
[3]
[Anonymous], 2013, Reliability Assessment of Electric Power Systems Using Monte Carlo Methods
[4]
Cam H, 2014, 2014 IEEE INTERNATIONAL INTER-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), P181, DOI 10.1109/CogSIMA.2014.6816560
[5]
Chen B., 2013, NORTH AMER POW SYMP, P1, DOI 10.1109/NAPS.2013.6666849
[6]
Chenaru O, 2017, MED C CONTR AUTOMAT, P1089, DOI 10.1109/MED.2017.7984263
[7]
Christiansson H, 2008, INT FED INFO PROC, V253, P237
[8]
Clarke E. M., 2012, TOOLS PRACTICAL SOFT, P1, DOI [DOI 10.1007/978-3-642-35746-6_1, 10.1007/978-3-642-35746-61]
[9]
Dagle J, 2001, 2001 IEEE POWER ENGINEERING SOCIETY WINTER MEETING, CONFERENCE PROCEEDINGS, VOLS 1-3, P108, DOI 10.1109/PESW.2001.917009
[10]
A framework to assess impacts of cyber attacks in manufacturing
[J].
PROCEEDINGS OF 2019 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2019),
2019,
:127-132