共 28 条
[1]
[Anonymous], 2015, Wired
[2]
[Anonymous], 2017, ROBOTICS LEGAL ETHIC
[3]
Atkinson D. J., 2015, 2015 AAAI SPRING S S
[4]
Attiah A., 2018, 2018 IEEE International Conference on Communications (ICC), P1, DOI [10.1109/ICC.2018.8422719, DOI 10.1109/ICC.2018.8422719]
[5]
Bedi H. S., 2011, 2011 IEEE SSCI Symposium on Computational Intelligence In Cyber Security (CICS 2011), P129, DOI 10.1109/CICYBS.2011.5949407
[6]
Berntorp K, 2018, 2018 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA), P404, DOI 10.1109/CCTA.2018.8511371
[7]
Risk Assessment of Malicious Attacks Against Power Systems
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
2009, 39 (05)
:1074-1085
[8]
Chiang Mung, 2018, ARXIV PREPRINT ARXIV
[9]
Ferdowsi A., 2017, ARXIV PREPRINT ARXIV
[10]
Ferdowsi A, 2018, IEEE INT C INTELL TR, P307, DOI 10.1109/ITSC.2018.8569635