共 50 条
- [32] Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 25 - 30
- [33] Exploiting Vulnerabilities in the SCADA Modbus Protocol: An ICT-Reliant Perspective ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2021, 2022, 1534 : 94 - 108
- [34] Analysis of Vulnerabilities in Radio Frequency Identification (RFID) Systems PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 453 - 457
- [35] Security analysis of vulnerabilities and threats for medical information systems ICIC Express Letters, 2015, 9 (03): : 849 - 854
- [36] Systems analysis of intracellular pH vulnerabilities for cancer therapy NATURE COMMUNICATIONS, 2018, 9
- [37] Systems analysis of intracellular pH vulnerabilities for cancer therapy Nature Communications, 9