共 8 条
[1]
Gulding threat analysis with threat source models
[J].
2007 IEEE INFORMATION ASSURANCE WORKSHOP,
2007,
:262-269
[3]
FURUKAWA T, 2003, P 2003 INT C ROB AUT, V1, P944
[4]
[胡静 HU Jing], 2007, [系统仿真学报, Journal of System Simulation], V19, P4932
[5]
Kennedy J, 1995, 1995 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS PROCEEDINGS, VOLS 1-6, P1942, DOI 10.1109/icnn.1995.488968
[6]
LI XD, 2003, EVOLUTIONARY COMPUTA, V3, P1772
[7]
Zelinski S, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P1
[8]
Zelinski S, 2003, IEEE INT CONF ROBOT, P3758