Author:
Dong Jiahan,Wang Liyong,Jin Tong,Li Bowen,Guo Guangxin,Zhang Xiaojuan
Reference10 articles.
1. The Operator-Splitting Method for Cahn-Hilliard is Stable
2. Large-Scale Vulnerability Analysis[C];FREI,2006
3. Analysis of the NIST Database Towards the Composition of Vulnerabilities in Attack Scenarios[R];FRANQUEIRA,2008
4. On the Significance of Process Comprehension for Conducting Targeted ICS Attacks[C];GREEN,2017
5. Intelligent and Efficient Method for Optimal Penetration Path Generation[J];WANG;Journal of Computer Research and Development,2019