共 37 条
- [1] Akyol B. A, 2012, P 3 INT WORKSH AG TE
- [2] Amullen EA, 2018, WORLD AUTOMAT CONG, P80, DOI 10.23919/WAC.2018.8430423
- [3] Bertsekas D., 2015, Parallel and Distributed Computation: Numerical Methods
- [4] Biondi P., 2019, Scapy
- [5] Intrusion Detection using a Multiple-Detector Set Artificial Immune System [J]. PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 283 - 286
- [6] Calkins H, 2017, J ARRYTHM, V33, P369, DOI 10.1016/j.joa.2017.08.001
- [7] Chih-Che Sun, 2016, 2016 Power Systems Computation Conference (PSCC), P1, DOI 10.1109/PSCC.2016.7540902
- [9] Duan XM, 2015, IEEE DECIS CONTR P, P4517, DOI 10.1109/CDC.2015.7402925
- [10] El Ajjouri M, 2015, 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), P241