[n] K. W. Fong, C. M. Estes, J. M. Fisher, and R. T. Shelton, “Application Software Structures Enables NIF Operations”, in Proc. ICALEPCS'01, San Jose, CA, USA, Nov. 2001, paper THCT003, pp. XX-XX.
[n] S. S. Tomar, S. N. Chaudhari, H. S. Chouhan, V. K. Maurya, and A. Rawat, “Design Development and Analysis of a Comprehensive Open Source System for Proactive Management of Security Aspects of a Control Network”, in Proc. PCaPAC'12, Kolkata, India, Dec. 2012, paper THCD06, pp. 134-138.
Use Complete Form