毕业典礼 发表于 2025-3-25 06:11:10

Lihua Wang,Licheng Wang,Zhenfu Cao,Eiji Okamoto,Jun Shaos increasingly employ commodity information technology (IT) elements and are being connected to the Internet. As a result, they have inherited IT cyber risks, threats and attacks that could affect the safe and reliable operation of infrastructure components, adversely affecting human safety and the

无法取消 发表于 2025-3-25 08:08:05

http://reply.papertrans.cn/47/4654/465365/465365_22.png

corpuscle 发表于 2025-3-25 13:51:35

http://reply.papertrans.cn/47/4654/465365/465365_23.png

Condense 发表于 2025-3-25 17:41:24

http://reply.papertrans.cn/47/4654/465365/465365_24.png

EWE 发表于 2025-3-25 21:29:36

http://reply.papertrans.cn/47/4654/465365/465365_25.png

Flustered 发表于 2025-3-26 02:44:18

http://reply.papertrans.cn/47/4654/465365/465365_26.png

壁画 发表于 2025-3-26 08:09:30

http://reply.papertrans.cn/47/4654/465365/465365_27.png

无情 发表于 2025-3-26 10:43:10

http://reply.papertrans.cn/47/4654/465365/465365_28.png

aggressor 发表于 2025-3-26 16:40:37

http://reply.papertrans.cn/47/4654/465365/465365_29.png

itinerary 发表于 2025-3-26 19:07:13

http://reply.papertrans.cn/47/4654/465365/465365_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology; 6th International Co Xuejia Lai,Moti Yung,Dongdai Lin Conference proceedings 2011 Springer Berlin Heid