共 16 条
- [1] Angle Matthew G., 2019, IEEE Power and Energy Technology Systems Journal, V6, P172, DOI 10.1109/JPETS.2019.2923970
- [2] Intelligent, Automated Red Team Emulation [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 363 - 373
- [3] Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03): : 1157 - 1168
- [4] Chhetri SR, 2019, DES AUT TEST EUROPE, P770, DOI [10.23919/date.2019.8715283, 10.23919/DATE.2019.8715283]
- [5] Online Learning for Commercial Buildings [J]. E-ENERGY'19: PROCEEDINGS OF THE 10TH ACM INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS, 2019, : 522 - 530
- [7] Hota A. R., 2018, Game Theory for Security and Risk Management, P157
- [9] Miehling E., 2015, P 2 ACM WORKSH MOV T, P67
- [10] Miller D., 2018, TECHNICAL PAPER