共 22 条
- [1] [Anonymous], 2016, PROCEEDINGS OF IEEE
- [2] [Anonymous], 2006, P 13 ACM C COMPUTER, DOI DOI 10.1145/1180405.1180446
- [3] Bagnato Alessandra, 2012, International Journal of Secure Software Engineering, V3, P1, DOI 10.4018/jsse.2012040101
- [4] Bowen B. M., 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST 2011), P230, DOI 10.1109/THS.2011.6107876
- [5] CARLISLE M, 2015, IEEE SENS J, DOI DOI 10.1109/JSEN.2017.2674181
- [6] ELEDA P, 2015, IEEE COMMUN LETT, DOI DOI 10.1109/LCOMM.2015.2449315
- [7] EVANS M, 2019, IEEE T VEH TECHNOL, V80, P74, DOI DOI 10.1016/J.COSE.2018.09.002
- [8] National Cyber Range Overview [J]. 2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 123 - 128
- [9] HUANG K, 2018, TABLE OF INTEGRALS S, V51, DOI DOI 10.1145/3199674
- [10] *IXIA, 2014, IEEE T INFORM THEORY