Found: 4
Select item for more details and to access through your institution.
Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 14, p. 6189, doi. 10.3390/app14146189
- By:
- Publication type:
- Article
Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement.
- Published in:
- Scientific Programming, 2020, p. 1, doi. 10.1155/2020/8895804
- By:
- Publication type:
- Article
Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement.
- Published in:
- Scientific Programming, 2020, p. 1, doi. 10.1155/2020/8895804
- By:
- Publication type:
- Article
The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait.
- Published in:
- Scientific Programming, 2020, p. 1, doi. 10.1155/2020/8872482
- By:
- Publication type:
- Article