共 22 条
[1]
[Anonymous], P 48 INT U C POW ENG
[2]
Baktir S., 2014, P INT C IT CONV SEC, P1
[4]
Bitzer B., 2015, P 50 INT U POWER ENG, P1, DOI [10.1109/UPEC.2015.7339938, DOI 10.1109/UPEC.2015.7339938]
[5]
Borden AR, 2012, ANN ALLERTON CONF, P1300, DOI 10.1109/Allerton.2012.6483368
[6]
Borden AR, 2013, ANN ALLERTON CONF, P1021, DOI 10.1109/Allerton.2013.6736637
[9]
Dreier J., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P916, DOI 10.1109/PASSAT/SocialCom.2011.19
[10]
Feng L, 2016, PROT CONTR MOD POW, V1, DOI 10.1186/s41601-016-0021-1