CORC

浏览/检索结果: 共8条,第1-8条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Vulnerability evaluation and link addition protection strategy research of electrical cyber-physical interdependent networks 期刊论文
Dianwang Jishu/Power System Technology, 2016, 卷号: 40, 期号: 6
作者:  Ji, Xingpei;  Wang, Bo;  Dong, Zhaoyang;  Chen, Guo;  Liu, Dichen
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Vulnerability Evaluation of Security Network Based on Neyman-Pearson Criterion 会议论文
作者:  Lv, Haitao;  Hu, Ruimin;  Chen, Jun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Water resource vulnerability & adaptation management to climate change & human activity in North China 会议论文
作者:  Xia, Jun
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
Structural vulnerability evaluation model based on improved electrical betweenness 期刊论文
Applied Mechanics and Materials, 2013, 卷号: 291-294
作者:  Zheng, Lianghua;  Lin, Tao;  Xie, Chungui;  Fan, Xingyuan;  Cai, Liaxia
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Structural Vulnerability Evaluation Model Based on Improved Electrical Betweenness 会议论文
作者:  Zheng, Lianghua;  Lin, Tao;  Xie, Chungui;  Fan, Xingyuan;  Cai, Liaxia
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Review of Risk Assessment Approaches in the Area of Security System 会议论文
作者:  Qing Cai;  JingjingDai
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Water resources vulnerability and adaptive management in the Huang, Huai and Hai river basins of China 期刊论文
WATER INTERNATIONAL, 2012, 卷号: 37, 期号: 5
作者:  Xia, Jun;  Qiu, Bing;  Li, Yuanyuan
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Network Security Architecture Based on Vulnerability Evaluation 会议论文
作者:  Li, June;  Wang, Tongqing
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace