共 23 条
- [1] Alahmadi B. A., 2018, P APWG S EL CRIM RES, P1
- [2] [Anonymous], NEURAL COMPUTING APP
- [3] [Anonymous], 1997, Intelligent Agents III Agent Theories, Architectures, and Languages, DOI [DOI 10.1007/BFB0013570, 10.1007/BFb0013570]
- [5] Guariti G., 2013, 2013 IEEE MTTS Int. Microw. Symp. Digest, P1
- [6] Herrero A, 2007, ADV SOFT COMP, V44, P320
- [7] Hsu CH, 2010, LECT NOTES COMPUT SC, V6307, P464, DOI 10.1007/978-3-642-15512-3_24
- [8] Kotenko I, 2010, CONFERENCE ON CYBER CONFLICT, PROCEEDINGS 2010, P21
- [9] Towards a Network-Based Framework for Android Malware Detection and Characterization [J]. 2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 233 - 242
- [10] Distributed Finite-Time Cooperative Control for Quadrotor Formation [J]. IEEE ACCESS, 2019, 7 : 66753 - 66763