共 50 条
- [31] Key-Recovery Attack on Reduced-Round AES-128 Using the Exchange-Equivalence Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2213 - 2221
- [32] A Practical Key-Recovery Attack on 805-Round Trivium ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 187 - 213
- [33] Privacy-preserving sequential step mining algorithm for multi-step attack correlation Qinghua Daxue Xuebao, 10 (1427-1434):
- [34] Automated Key Recovery Attacks on Round-Reduced Orthros PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 189 - 213
- [35] A Multi-Step Attack Pattern Discovery Method Based on Graph Mining PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 376 - 380
- [36] Security risk assessment based on bayesian multi-step attack graphs Journal of Computational Information Systems, 2015, 11 (11): : 3911 - 3918
- [37] An Unsupervised Two-Layer Multi-Step Network Attack Detector IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1308 - 1309
- [38] MAAC: Novel Alert Correlation Method To Detect Multi-step Attack 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 726 - 733
- [39] Introducing a New Alert Data Set for Multi-Step Attack Analysis PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 32 - 44
- [40] REDUCED MULTI-STEP ALGORITHMS FOR IDENTIFICATION OF LINEAR PLANTS. Problems of control and information theory, 1988, 17 (01): : 23 - 32