共 60 条
[3]
[Anonymous], 2014, SMART GRID INTEROPER, DOI DOI 10.6028/NIST.IR.7628R1
[4]
Ayad A., 2018, 2018 IEEE POWER ENER, P1, DOI DOI 10.1109/ISGT.2018.8403355
[5]
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures
[J].
JOURNAL OF INFORMATION PROCESSING SYSTEMS,
2019, 15 (04)
:865-889
[6]
Bedi H. S., 2011, 2011 IEEE SSCI Symposium on Computational Intelligence In Cyber Security (CICS 2011), P129, DOI 10.1109/CICYBS.2011.5949407
[7]
Bhatia S., 2014, AISC
[8]
Bienstock D., 2018, Principled deep neural network training through linear programming
[9]
Bobba R., 2010, Detecting false data injection attacks on dc state estimation
[10]
Çatalkaya MB, 2018, 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P133, DOI 10.1109/UBMK.2018.8566451