共 50 条
- [21] Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems 2023 IEEE 21ST INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, INDIN, 2023,
- [22] Execution at RISC: Stealth JOP Attacks on RISC-V Applications COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 377 - 391
- [23] Feasibility of multi-protocol attacks FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 287 - 294
- [24] On the Feasibility of Malware Attacks in Smartphone Platforms E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 217 - 232
- [26] Data-Driven Detection of Stealth Cyber-Attacks in DC Microgrids IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6097 - 6106
- [27] Enhancing the Transferability and Stealth of Deepfake Detection Attacks Through Latent Diffusion Models PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2024, PT IV, 2025, 15034 : 268 - 281
- [28] Vulnerability of Cyber-Physical Systems to Stealth Attacks: Application to a Chemical Process 2021 60TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2021, : 311 - 316
- [29] Vulnerabilities in GSM technology and feasibility of selected attacks SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY, DEFENSE, AND LAW ENFORCEMENT XIV, 2015, 9456