共 50 条
- [41] Digital vulnerabilities: dialogues and possible approaches with the Barberian theoretical contributions of communication CHASQUI-REVISTA LATINOAMERICANA DE COMUNICACION, 2021, (147): : 163 - 180
- [44] Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 747 - 761
- [45] Measuring the effectiveness of SDN mitigations against cyber attacks 2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
- [46] Vulnerabilities of reliable multicast protocols IEEE MILITARY COMMUNICATIONS CONFERENCE - PROCEEDINGS, VOLS 1-3, 1998, : 934 - 938
- [48] Enterprise WLAN Security Flaws Current Attacks and relative Mitigations 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [49] Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols VISUAL INFORMATICS: BRIDGING RESEARCH AND PRACTICE, 2009, 5857 : 510 - 520
- [50] Internal Security Attacks on SCADA Systems 2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 22 - 27