共 50 条
- [21] Deep Reinforcement Learning-Based VM Migration for IoT Security SOUTHEASTCON 2024, 2024, : 171 - 176
- [22] Security marketing - Developing needs-based security systems KRIMINALISTIK, 1999, 53 (05): : 341 - 344
- [23] Protocol engineering applied to formal analysis of security systems INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 246 - 259
- [24] Optimized design and research of the intelligent residential security systems based on Lonworks J. Convergence Inf. Technol., 2012, 8 (9-18):
- [25] The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5741 - 5752
- [26] Research on Security Facilities for Mountainous Countryside Based on the Characteristics of Security Needs PROGRESS IN STRUCTURE, PTS 1-4, 2012, 166-169 : 2757 - +
- [27] PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 9 - 18
- [28] Optimizing Information Systems Security Design Based on Existing Security Knowledge ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015, 2015, 215 : 447 - 458
- [30] Practical security region based security cost allocation of power systems Zhongguo Dianji Gongcheng Xuebao, 2009, 19 (1-7):