Publisher
Springer Nature Switzerland
Reference82 articles.
1. Falliere, N., Murchu, L., Chien, E.: W32 Stuxnet Dossier, 2011
2. Schenato, L.: To Zero or to Hold Control Inputs with Lossy Links?. In: IEEE Transaction on Automatic Control, Vol. 54, No. 5, pp. 1093–1099, 2009
3. McHugh, J.: Intrusion and Intrusion Detection. Int. J. Info. Syst. Vol. 1, pp. 14–35, 2001. DOI 10.1007/s102070100001 (accessed 12.2022)
4. Kumar, S., Spalfrd, E.H.: An Application of Pattern Matching in Intrusion Detection. In: Computer Science Technical Report, Paper 126, Purdue University, 1994
5. Gordon, S., Ford, R.: On the Definition and Classification of Cybercrime. In. Journal in Computer Virology, Vol. 2, No. 1, pp. 13–20, 2006
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献