共 50 条
- [31] Survey on Attack Surface Dynamic Transfer Technology Based on Moving Target Defense Ruan Jian Xue Bao/Journal of Software, 2018, 29 (09): : 2799 - 2820
- [32] Conversion technology of attack-defense formations based on improved MOPSO algorithm Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2010, 42 (SUPPL. 2): : 93 - 97
- [33] A buffer overflow detection and defense method based on RISC-V instruction set extension Cybersecurity, 6
- [35] Research on Teaching Methods and Contents of Public Security Institutions "Network Attack and Defense Technology" Course NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 216 - 219
- [36] Research on Basketball Confrontation Techniques in Attack and Defense FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 534 - 538
- [37] Research on Phishing AP Attack Detection Technology Based on RSSI PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 205 - 208
- [38] Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 978 - +
- [39] Discussion on the Technology of Computer Network Hacker Attack and Defense PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 213 - 217