共 50 条
- [42] Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process [J]. Wireless Personal Communications, 2018, 102 : 1401 - 1420
- [43] Network Security Risk Assessment Method Research Based on Fuzzy Analytic Hierarchy Process [J]. NANOTECHNOLOGY AND COMPUTER ENGINEERING, 2010, 121-122 : 80 - 86
- [44] Topology-aware Virtual Network Embedding through Bayesian Network Analysis [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012,
- [45] Process security in the network of pharmaceutical companies [J]. PHARMAZEUTISCHE INDUSTRIE, 2004, 66 (11A): : 1387 - 1389
- [46] Security Analysis of Topology Structure of Electric Power Communication Network [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 76 - 79
- [47] Analysis of Security and Threat of Underwater Wireless Sensor Network Topology [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
- [48] Robust Virtual Network Topology Control based on Attractor Selection [J]. ONDM: 2009 INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING, 2009, : 123 - +
- [49] Stability of virtual network topology control for overlay routing services [J]. JOURNAL OF OPTICAL NETWORKING, 2008, 7 (07): : 704 - 719
- [50] On the stability of virtual network topology control for overlay routing services [J]. 2007 FOURTH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS & SYSTEMS, VOLS 1 AND 2, 2007, : 810 - +