共 208 条
[1]
Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
[3]
Akram RN, 2016, IEEE TRUST BIG, P606, DOI [10.1109/TrustCom.2016.0116, 10.1109/TrustCom.2016.115]
[4]
Al-kahtani MohammedSaeed., 2012, Signal Processing and Communication Systems (ICSPCS), 2012 6th International Conference on, P1, DOI DOI 10.1109/ICSPCS.2012.6507953
[5]
Cyber-Attack Modeling Analysis Techniques: An Overview
[J].
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW),
2016,
:69-76
[6]
Albani Dario., 2017, 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), P1, DOI DOI 10.1109/AVSS.2017.8078478
[7]
Alemzadeh Homa, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P395, DOI 10.1109/DSN.2016.43
[9]
[Anonymous], SPECIAL PUBLICATION
[10]
[Anonymous], SECURITY ROBOT ACCID