共 50 条
- [43] Wang YY, 2010, CHIN CONTR CONF, P5329
- [44] WATKINS CJCH, 1992, MACH LEARN, V8, P279, DOI 10.1007/BF00992698
- [45] Wilhoit K., 2013, TREND MICRO, V10
- [46] Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (02): : 703 - 715
- [47] Cost-Aware Network Hardening with Limited Budget using Compact Attack Graphs [J]. 2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 152 - 157
- [49] Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (12): : 7823 - 7837