2021
DOI: 10.1016/j.anucene.2020.108114
|View full text |Cite
|
Sign up to set email alerts
|

Discussion on the treatment of various dependencies in a time-dependent risk monitoring model of redundant systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Once the data flow security requirements are determined, to control the data flow risk within a reasonable range, security strategies need to be formulated and implemented. The security policy can be formulated according to relevant standards 18 or designed by ourselves. The formulation of the security strategy should consider the following three points: …”
Section: Methodsmentioning
confidence: 99%
“…Once the data flow security requirements are determined, to control the data flow risk within a reasonable range, security strategies need to be formulated and implemented. The security policy can be formulated according to relevant standards 18 or designed by ourselves. The formulation of the security strategy should consider the following three points: …”
Section: Methodsmentioning
confidence: 99%