共 50 条
- [3] LEARNING REQUIREMENTS FOR STEALTH ATTACKS 2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 8102 - 8106
- [4] Stealth attacks in vehicular technologies VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 1218 - 1222
- [5] Taxation in Virtual World: Inevitability and Feasibility 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 480 - 485
- [6] Cloud: A Platform To Launch Stealth Attacks 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1558 - 1563
- [8] Stealth attacks on PCBs: an experimental plausibility analysis 2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 905 - 912
- [9] Stealth and Semi-Stealth MITM Attacks, Detection and Defense in IPv4 Networks 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 364 - 367
- [10] Stealth attacks on ad-hoc wireless networks 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2103 - 2111