共 50 条
- [1] A multi-level security model based on trusted computing PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 448 - +
- [3] Design and implementation of security operating system based on trusted computing PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2776 - +
- [5] Challenges and Prospects of Cyber Security Protection for New Power System Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2023, 47 (08): : 15 - 24
- [7] Security Protection and Testing System for Cyber-Physical Based Smart Power Grid PROCEEDINGS OF 2019 INTERNATIONAL FORUM ON SMART GRID PROTECTION AND CONTROL (PURPLE MOUNTAIN FORUM), VOL I, 2020, 584 : 847 - 857
- [8] Development of a Chip-Level Ultimate Security Device Using Reactive Composites 20TH INTERNATIONAL CONFERENCE ON MICRO AND NANOTECHNOLOGY FOR POWER GENERATION AND ENERGY CONVERSION APPLICATIONS (POWERMEMS 2021), 2021, : 204 - 207
- [9] Security strategy of DRM based on trusted computing Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234