共 50 条
- [1] Abed-Alguni Bilal H., 2016, International Journal of Artificial Intelligence, V14, P71
- [2] Ali Meerza SyedIrfan., 2019, IEEE 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), P1
- [3] Babu B, 2017, 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), P47, DOI 10.1109/Anti-Cybercrime.2017.7905261
- [4] Bandyopadhyay S., 2013, Some Single- and Multiobjective Optimization Techniques BT - Unsupervised Classification: Similarity Measures, Classical and Metaheuristic Approaches, and Applications, P17, DOI [DOI 10.1007/978-3-642-32451-2_2, 10.1007/978-3-642-32451-2_2]
- [5] Security for Process Control Systems An Overview [J]. IEEE SECURITY & PRIVACY, 2008, 6 (06) : 24 - 29
- [6] BUTLER S, 2002, P S REQ ENG INF SEC
- [7] Butler SA, 2002, ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P232, DOI 10.1109/ICSE.2002.1007971
- [9] Clarke G., 2004, PRACTICAL MODERN SCA
- [10] Q-Learning: Theory and Applications [J]. ANNUAL REVIEW OF STATISTICS AND ITS APPLICATION, VOL 7, 2020, 2020, 7 : 279 - 301