Q Chen, M Zhang, H Kong, Y Zhang… - 2016 2nd IEEE …, 2016 - ieeexplore.ieee.org
The situation of attack and the vulnerability of protection can be understood by analyzing the
exception response of information system which enters the exception state after the attack …