共 50 条
- [1] Subversion: from covert operations to cyber conflict SMALL WARS AND INSURGENCIES, 2024, 35 (07): : 1289 - 1293
- [3] Robust Covert Attack Strategies and Their Detection for Switched Cyber-Physical Systems 2023 31ST MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, MED, 2023, : 389 - 394
- [4] Jamming Strategies in Covert Communication CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2019, 2019, 11527 : 1 - 15
- [5] Jamming strategies in covert communication Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11527 LNCS : 1 - 15
- [6] Strategies for Covert Web Search 2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013), 2014, : 50 - 57
- [7] Covert Channels in Cyber-Physical Systems IEEE CONTROL SYSTEMS LETTERS, 2021, 5 (04): : 1273 - 1278
- [9] Topology of covert conflict (transcript of discussion) SECURITY PROTOCOLS, 2007, 4631 : 329 - 332
- [10] Covert Channels in Cyber-Physical Systems 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 4649 - 4654