共 50 条
- [41] A Relational Approach to Evil Action: Vulnerability and its Exploitation The Journal of Value Inquiry, 2019, 53 : 33 - 53
- [43] Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks 2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INTERNET (ICII 2018), 2018, : 139 - 145
- [44] VULNERABILITY OF PESTS - STUDY AND EXPLOITATION FOR SAFER CHEMICAL CONTROL ACS SYMPOSIUM SERIES, 1987, 336 : 54 - 76
- [45] Hands-on Lab on Smart City Vulnerability Exploitation 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1777 - 1782
- [46] Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach APPLIED SCIENCES-BASEL, 2023, 13 (22):
- [47] Research on Automatic Exploitation of House of Spirit Heap Overflow Vulnerability PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 751 - 757
- [49] A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 238 - 241
- [50] Vulnerability Analysis and Exploitation of Location Privacy Leakage in Webcasting Platforms Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 1095 - 1111