共 50 条
- [2] A Realistic Attack on SVD Based Watermarking Scheme 2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 1238 - 1242
- [3] Combat network effectiveness evaluation under different node attack strategies based on operation loop Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (11): : 3220 - 3228
- [4] Cascading Failures in Power Grid under Three Node Attack Strategies INTELLIGENT COMPUTING METHODOLOGIES, 2014, 8589 : 779 - 786
- [5] Robustness of network attack strategies against node sampling and link errors PLOS ONE, 2019, 14 (09):
- [6] Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1027 - 1032
- [9] Game based DDoS Attack Strategies in Cloud of Things PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 759 - 762
- [10] An Approach Toward the Optimization of Witness Based Node Clone Attack 2015 THIRD INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2015, : 506 - 510