共 50 条
- [41] Generative Adversarial Network Based Image-Scaling Attack and Defense Modeling IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2025, 9 (01): : 861 - 873
- [42] A Novel Network Delay Based Side-Channel Attack: Modeling and Defense 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2390 - 2398
- [43] Research on computer network attack modeling based on attack graph Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
- [44] Exploiting attack-defense trees to find an optimal set of countermeasures 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), 2020, : 395 - 410
- [45] Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata GRAPHICAL MODELS FOR SECURITY, 2018, 10744 : 75 - 90
- [48] Correlating multi-step attack and constructing attack scenarios based on attack pattern modeling PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 214 - +
- [49] Attack Vulnerabilities Analysis of Elgamal Elliptical Curve Based Stegocrypt Using Attack Trees 2018 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2018, : 290 - 294
- [50] AES power attack based on induced cache miss and countermeasure ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 586 - 591