共 31 条
[1]
Cozman F. G., JAVABAYES USER MANUA
[3]
DARIENZO M, 2013, ADV INF NETW APPL WO, P1588, DOI DOI 10.1109/WAINA.2013.33
[4]
Model-driven estimation of distributed vulnerability in complex railway networks
[J].
2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING,
2013,
:380-387
[5]
Edge K. S., 2006, P 2006 IEEE C MIL CO, P953
[6]
Einarsson S, 1998, RISK ANAL, V18, P535, DOI 10.1111/j.1539-6924.1998.tb00367.x
[7]
Ficco Massimo, 2013, International Journal of High Performance Computing and Networking, V7, P173
[8]
Ficco M., 2011, P 13 EUR WORKSH DEP, P15, DOI [10.1145/1978582.1978586, DOI 10.1145/1978582.1978586]
[9]
Flammini F., 2013, SECURITY ENG INTELLI, V8128, P442