共 37 条
[1]
Akyol B. A, 2012, P 3 INT WORKSH AG TE
[2]
Amullen EA, 2018, WORLD AUTOMAT CONG, P80, DOI 10.23919/WAC.2018.8430423
[3]
Bertsekas DP, 2003, Parallel and distributed computation: numerical methods, V2nd
[4]
Biondi P., 2019, Scapy
[5]
Intrusion Detection using a Multiple-Detector Set Artificial Immune System
[J].
PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI),
2016,
:283-286
[6]
Calkins H, 2017, J ARRYTHM, V33, P369, DOI 10.1016/j.joa.2017.08.001
[7]
Chih-Che Sun, 2016, 2016 Power Systems Computation Conference (PSCC), P1, DOI 10.1109/PSCC.2016.7540902
[9]
Duan XM, 2015, IEEE DECIS CONTR P, P4517, DOI 10.1109/CDC.2015.7402925
[10]
El Ajjouri M, 2015, 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), P241