共 50 条
- [31] Securing mobile auctions in the presence of malicious adversaries 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 433 - 437
- [33] Detect Malicious Attacks from Entire TCP Communication Process NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 867 - 877
- [34] Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks AI 2008: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2008, 5360 : 470 - +
- [35] Securing MAODV: Attacks and countermeasures 2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 521 - 532
- [36] Securing Docker Containers from Denial of Service (DoS) Attacks PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 856 - 859
- [37] Hunting Malicious Attacks in Social Networks 2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011, : 13 - 16
- [39] Reducing Network Vulnerability to Malicious Attacks 2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 718 - 723
- [40] A2: Analog Malicious Hardware 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 18 - 37