共 50 条
- [1] Stalking the wily computer [J]. JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2001, 93 (04): : 8 - 8
- [2] FOILING THE WILY HACKER - MORE THAN ANALYSIS AND CONTAINMENT [J]. 1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 15 - 21
- [3] A secure environment for untrusted helper applications - Confining the wily hacker [J]. PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 1 - 13
- [8] WILES WILY WELTANSCHAUUNG - REJOINDER [J]. JOURNAL OF POST KEYNESIAN ECONOMICS, 1981, 3 (03) : 352 - 358