共 10 条
- [1] [Anonymous], 2002, ICSE 2002 P 24 INT C, DOI DOI 10.1145/581339.581370
- [2] CHENGHUA T, 2006, LNCS, V4318, P168
- [3] Clark D. D., 1987, Proceedings of the 1987 IEEE Symposium on Security and Privacy (Cat. No.87CH2416-6), P184
- [4] Hongzi W, 2005, ACTA ELECTRONICA SIN, V33, P222
- [5] KAIYU W, 2006, SECURITY CONTEXTS AU, P1523
- [6] MEES W, 2007, RISK MANAGEMENT COAL, P329
- [7] SHUANGHE P, 2005, J COMPUTER RES DEV, V42, P1587
- [8] Sihan Q, J COMPUTER RES DEV, V44, P1881
- [9] Yu JX, 2006, 2006 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION. VOLS 1-5, P2200
- [10] ZHI T, 2003, J NE U NATURAL SCI, V24, P747