Li, Y., & Wang, F. Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS. IEEE.
Chicago Style (17th ed.) CitationLi, Yajie, and Feiping Wang. Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS. IEEE.
MLA (9th ed.) CitationLi, Yajie, and Feiping Wang. Design Method of ICPS Comprehensive Security Controller With Multi-Target Constraints and DoS Intrusion Tolerance Capability Driven by Double End ADETCS. IEEE.
Warning: These citations may not always be 100% accurate.