Author:Shi Congcong
KeyphrasesAttack scene, Cyber Risk Analysis, Grid cyber attack, Grid key equipment, management and control process, mechanism guarantee, power grid information security, Technical Support, Vulnerability Mining, whole life cycle. |
| ||||
Copyright © 2012-2024 easychair.org. All rights reserved. |