Li, S. ., Wang, T. ., Ma, J. ., & Zhao, W. . (2023). A three-party attack-defense deception game model based on evolutionary. In (p. 51—56). IEEE. http://doi.org/10.1109/ICCECE58074.2023.10135374 (Original work published 2024)
Dang, F. ., Yan, L. ., Li, S. ., & Li, D. . (2022). Trusted Dynamic Threshold Caculation Method in Power IoT. In 2022 14th International Conference on Communication Software and Networks (ICCSN) (pp. 19–22).