共 10 条
- [1] Li Y., Guo J., Yang Y., Et al., Formal modeling of railway signal safety critical software, Journal of the China Railway Society, 39, 9, pp. 74-80, (2017)
- [2] Lyu Y.-J., Xu W.-J., Liu Y., Et al., Design of intelligent watt-hour meter software recording and comparing system based on cryptography, Power System Technology, 40, 11, pp. 3604-3608, (2016)
- [3] Yang F., Yang G.-W., Hao Y.-J., Security analysis of semi-quantum cryptography protocols by model checking, Journal of University of Electronic Science and Technology of China, 46, 5, pp. 716-721, (2017)
- [4] Huan Z.-Q., Ni H., Hu L.-L., Et al., Application security detection based on Android access permission mechanism, Computer Engineering and Design, 37, 1, pp. 42-45, (2016)
- [5] Chen H., Qing S.-H., Android malware detection method based on combined algorithm, Telecommunications Science, 32, 10, pp. 15-21, (2016)
- [6] Jia L., Gao Y., Wang Y.-H., Safety enhancement method for solid state thermal mechanical discriminator, Journal of Detection & Control, 39, 3, pp. 92-96, (2017)
- [7] Wei Q.-F., Yang Z.-M., Hu X.-D., Et al., A remote login-focused brute-force attack detection methods based on network flow characteristics, Journal of Southwest University(Natural Science), 39, 7, pp. 149-154, (2017)
- [8] Wang N.-P., Security evaluation against differential cryptanalysis for four-block CLEFIA-like transform cluster, Acta Electronica Sinica, 45, 10, pp. 2528-2532, (2017)
- [9] Chen M.-L., Lin J.-M., Bai W., Development and preliminary validation of Hydrogen safety analysis code CYCAS, Atomic Energy Science and Technology, 50, 2, pp. 295-300, (2016)
- [10] Su S., Li Z.-Q., Gu K., Et al., Cloud security based malware detection in advanced metering infrastructure, Automation of Electric Power Systems, 41, 5, pp. 134-138, (2017)