共 50 条
- [42] The Impact of US Cyber Policies on Cyber-Attacks Trend [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
- [43] Impact Of Cyber-Attacks On Critical Infrastructure [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 183 - 186
- [45] How to prevent cyber-attacks in inter-vehicle communication network? [J]. 2015 INTERNATIONAL CONFERENCE ON PROTOCOL ENGINEERING (ICPE) AND INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF DISTRIBUTED SYSTEMS (NTDS), 2015,
- [46] Cyber-Attacks in Modular Multilevel Converters [J]. IEEE TRANSACTIONS ON POWER ELECTRONICS, 2022, 37 (07) : 8488 - 8501
- [48] Communications Network Analysis in a SCADA System Testbed Under Cyber-Attacks [J]. 2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 341 - 344
- [49] Cyber-Attacks Against Transportation Infrastructure [J]. TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 151 - 161
- [50] The weakest link on the network: exploiting ADSL routers to perform cyber-attacks [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 135 - 139