共 23 条
[1]
Alahmadi B. A., 2018, P APWG S EL CRIM RES, P1
[2]
[Anonymous], NEURAL COMPUTING APP
[3]
[Anonymous], 1997, Intelligent Agents III Agent Theories, Architectures, and Languages, DOI [DOI 10.1007/BFB0013570, 10.1007/BFb0013570]
[5]
Guariti G., 2013, 2013 IEEE MTTS Int. Microw. Symp. Digest, P1
[6]
Herrero A, 2007, ADV SOFT COMP, V44, P320
[7]
Hsu CH, 2010, LECT NOTES COMPUT SC, V6307, P464, DOI 10.1007/978-3-642-15512-3_24
[8]
Kotenko I, 2010, CONFERENCE ON CYBER CONFLICT, PROCEEDINGS 2010, P21
[9]
Towards a Network-Based Framework for Android Malware Detection and Characterization
[J].
2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST),
2017,
:233-242
[10]
Distributed Finite-Time Cooperative Control for Quadrotor Formation
[J].
IEEE ACCESS,
2019, 7
:66753-66763