J Tan, C Lei, H Zhang, Y Cheng - computers & security, 2019 - Elsevier
… sides and invariant in the targeted system, the process of network state change, which achieves
… The attacker intends to detect resource vulnerabilities in MES to launch attacks, whereas …