共 15 条
[1]
[Anonymous], 2009, ACM SIGKDD explorations newsletter, DOI 10.1145/1656274.1656278
[2]
[Anonymous], 2005, DATA MINING PRACTICA
[3]
Cardwell L., 2013, J CYBER SECUR INF SY, V1, P2
[4]
Clarke G., 2004, PRACTICAL MODERN SCA, P537
[6]
Institute of Electrical and Electronics Engineers, 2012, IEEE STAND EL POW SY
[7]
Jing Cai, 2010, 2010 12th IEEE International Conference on Communication Technology (ICCT 2010), P116, DOI 10.1109/ICCT.2010.5689203
[8]
Evaluation of Security Solutions in the SCADA Environment
[J].
DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS,
2014, 45 (01)
:38-53
[9]
Maiolini G, 2009, LECT NOTES COMPUT SC, V5550, P182, DOI 10.1007/978-3-642-01399-7_15
[10]
A cryptographic tour of the IPsec standards
[J].
Information Security Technical Report,
2006, 11 (02)
:72-81