共 52 条
[1]
Alpcan T., 2010, NETWORK SECURITY, DOI DOI 10.1017/CBO97805117607782-S2.0-84924666047
[2]
[Anonymous], 2015, SOUTHEASTCON 2015
[3]
Auman RJ, 1985, FRONTIERS EC, P5
[6]
How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games
[J].
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2017,
:7-21
[8]
Combining forecasts in short term load forecasting: Empirical analysis and identification of robust forecaster
[J].
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES,
2016, 41 (10)
:1123-1133
[9]
An Evolutionary Game for Integrity Attacks and Defences for Advanced Metering Infrastructure
[J].
ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS,
2018,
[10]
Chen H, 2017, POWER SYSTEM OPTIMIS