共 50 条
- [41] Sensor arrangement method based on vulnerability analysis for a truss bridge Gongcheng Lixue/Engineering Mechanics, 2010, 27 (SUPPL. 2): : 263 - 265
- [43] Novel Method of Assessing Network Security Risks Based on Vulnerability Correlation Graph PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1085 - 1090
- [45] Vulnerability mining method for industrial control network protocol based on fuzz testing Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
- [46] Smart Contract Vulnerability Detection Method Based on Capsule Network and Attention Mechanism Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2023, 51 (05): : 36 - 44
- [47] A novel transmission line vulnerability evaluation method based on complex network theory CURRENT DEVELOPMENT OF MECHANICAL ENGINEERING AND ENERGY, PTS 1 AND 2, 2014, 494-495 : 1866 - +
- [48] Dynamic Awareness Method for Network Threats based on Rough Vulnerability Relation Model INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 89 - 97
- [49] Physical Vulnerability Analysis of Metro System Based on Complex Network Theory PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 408 - 414