HIGHLIGHTS
- What: The fourth layer of the model is designed to address external threats to software and Thedevices, fourth layer of the model is designed to and address external threats to software and hardware considering both the frequency severity of the attacks. The aim of this study is to s and the ordinary BRB optimization model.
- Who: Qingqing Yang and colleagues from the College of Computer Science and Information Engineering, Harbin Normal University, Harbin, China have published the article: An Industrial Internet Security Assessment Model Based on a Selectable Confidence Rule Base, in the Journal: Sensors . . .

If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.