共 50 条
- [23] Automated Generation of Attack Graphs Using NVD PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 135 - 142
- [24] Automated crowdturfing attack in Chinese user reviews Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 1 - 13
- [25] DACA: Automated Attack Scenarios and Dataset Generation PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 550 - 558
- [27] Exploring the Prudent Limits of Automated Cyber Attack 2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
- [28] Automated Detection of Drive-by Download Attack 2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 511 - 515
- [29] Diophantine approximation attack on a fast public key cryptosystem INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 25 - 32