共 44 条
[1]
[Anonymous], 2010, HOTNETS 9, DOI DOI 10.1145/1868447.1868466
[2]
Antonioli D., 2015, P 1 ACM WORKSH CYB P, P91, DOI DOI 10.1145/2808705.2808715
[3]
Baheti R., 2011, The Impact of Control Technology, P161, DOI DOI 10.1145/1795194.1795205
[4]
Becue A., 2018, CyberFactory#1-Securing the Industry 4.0 with cyber-ranges and digital twins, P1, DOI DOI 10.1109/WFCS.2018.8402377
[5]
Biere A, 2003, ADV COMPUT, V58, P117
[6]
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation
[J].
COMPUTER SECURITY (ESORICS 2018), PT I,
2018, 11098
:533-554
[9]
Damjanovic-Behrendt V, 2018, 2018 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), P272, DOI 10.1109/IS.2018.8710526
[10]
Z3: An efficient SMT solver
[J].
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS,
2008, 4963
:337-340