CORC

浏览/检索结果: 共6条,第1-6条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Incremental Theory Closure Reasoning for Large Scale Knowledge Graphs 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 24593-24601
作者:  Luo, Jie;  Wang, Yifei;  Xu, Yi
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/30
Analysis of Cybersecurity Threats on Connected Vehicles with CACC Based on an Improved Car-Following Model 会议论文
CICTP 2018: Intelligence, Connectivity, and Mobility - Proceedings of the 18th COTA International Conference of Transportation Professionals
作者:  Huang, L.;  Wu, X.;  Qin, H.;  Wang, P.;  Yu, G.
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
When Machine Learning meets Security Issues: A survey 会议论文
2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2018-01-01
作者:  Guan, Zhenyu;  Bian, Liangxu;  Shang, Tao;  Liu, Jianwei
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Analysis of Cybersecurity Threats on Connected Vehicles with CACC Based on an Improved Car-Following Model 会议论文
18th COTA International Conference of Transportation Professionals: Intelligence, Connectivity, and Mobility, CICTP 2018, Beijing, China, 2018-07-05
作者:  Huang, Lei;  Wu, Xinkai;  Qin, Hongmao;  Wang, Pengcheng;  Yu, Guizhen
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Risk assessment method for cybersecurity of cyber-physical systems based on inter-dependency of vulnerabilities 会议论文
IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2015, Singapore, Singapore, 2015-12-06
作者:  Wu, Wenbo;  Kang, Rui;  Li, Zi
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
Risk Assessment Method for Cybersecurity of Cyber-Physical Systems Based on Inter-Dependency of Vulnerabilities 会议论文
2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2015-01-01
作者:  Wu, Wenbo;  Kang, Rui;  Li, Zi
收藏  |  浏览/下载:5/0  |  提交时间:2020/01/06


©版权所有 ©2017 CSpace - Powered by CSpace