Shizhuang Yin, Q. Shi, Z. You, Weiyi Wu, Yurong Guo
{"title":"基于复杂网络的软件密集型设备安全关键技术综述","authors":"Shizhuang Yin, Q. Shi, Z. You, Weiyi Wu, Yurong Guo","doi":"10.1142/S1793962322500611","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"9 1","pages":"2250061:1-2250061:26"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A review on key technologies of invulnerability of software-intensive equipment based on complex network\",\"authors\":\"Shizhuang Yin, Q. Shi, Z. You, Weiyi Wu, Yurong Guo\",\"doi\":\"10.1142/S1793962322500611\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":13657,\"journal\":{\"name\":\"Int. J. Model. Simul. Sci. Comput.\",\"volume\":\"9 1\",\"pages\":\"2250061:1-2250061:26\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Model. Simul. Sci. Comput.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1142/S1793962322500611\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Model. Simul. Sci. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/S1793962322500611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0