共 50 条
- [41] Security Risk Analysis based on probability of system failure, attacks and Vulnerabilities 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 874 - 879
- [42] Memcached DDoS Exploits: Operations, Vulnerabilities, Preventions and Mitigations PROCEEDINGS ON 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2018, : 171 - 179
- [43] FPGA Based Robots for Industrial Security and Application 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1757 - 1760
- [45] An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network Wireless Personal Communications, 2019, 105 : 545 - 565
- [46] BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks (Student Abstract) THIRTY-EIGTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 21, 2024, : 23506 - 23507
- [47] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
- [48] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3723 - 3768
- [50] Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 559 - 564