共 42 条
[3]
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
[4]
[Anonymous], 2016, ANAL CYBER ATTACK UK
[5]
Bapat R.B., 2010, Graphs and Matrices, V27
[6]
Bernstein A, 2014, IEEE INFOCOM SER, P2634, DOI 10.1109/INFOCOM.2014.6848211
[7]
Bienstock Daniel, 2017, ACM SIGMETRICS Performance Evaluation Review, V45, P115, DOI 10.1145/3152042.3152077
[8]
Bienstock D., 2016, Electrical transmission system cascades and vulnerability - an operations research viewpoint, volume 22 of MOS-SIAM Series on Optimization
[9]
Bobba R.B., 2010, Preprints of the First Workshop on Secure Control Systems, CPSWEEK, V2010
[10]
Bondy J.A., 2008, GTM