共 50 条
- [41] In over our heads? Questions on protecting US water supplies 1600, American Water Works Association (94):
- [42] Protecting water and wastewater infrastructure from cyber attacks Frontiers of Earth Science, 2011, 5 : 406 - 413
- [44] On protecting industrial automation and control systems against electronic attacks 2007 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING, VOLS 1-3, 2007, : 691 - 696
- [45] Protecting Dynamic Mobile Agent against Denial of Service Attacks INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 316 - +
- [46] PROTECTING NUCLEAR-FACILITIES AGAINST ATTACKS AND ACTS OF SABOTAGE ATOMWIRTSCHAFT-ATOMTECHNIK, 1984, 29 (02): : 75 - 79
- [47] Defense-PointNet: Protecting PointNet Against Adversarial Attacks 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5654 - 5660
- [48] DyPolDroid: Protecting Against Permission-Abuse Attacks in Android Information Systems Frontiers, 2023, 25 : 529 - 548
- [49] Protecting individual information against inference attacks in data publishing ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 422 - +
- [50] Protecting FIDO Extensions Against Man-in-the-Middle Attacks EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2022, 2023, 13782 : 70 - 87