共 50 条
- [31] Security Vulnerabilities on Implantable Medical Devices 2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
- [32] Colluded Applications Vulnerabilities in Android Devices 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 462 - 469
- [33] Hardware Devices Security, their Vulnerabilities and Solutions PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 439 - 445
- [34] Vulnerabilities in Hub Architecture IoT Devices 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88
- [35] Analysis of Security Vulnerabilities for IoT Devices JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
- [36] Understanding and Discovering SQL Injection Vulnerabilities ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 45 - 51
- [37] Understanding Security Vulnerabilities in File Systems APSYS'19: PROCEEDINGS OF THE 10TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, 2019, : 8 - 15