共 50 条
- [45] A Flow Attack Strategy based on Critical Links for Cyber-attack 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
- [46] Thwarting cyber-attack reconnaissance with inconsistency and deception 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 151 - +
- [47] Telecom links provide cyber-attack route AVIATION WEEK & SPACE TECHNOLOGY, 1999, 151 (19): : 81 - 83
- [48] Counterplanning deceptions to foil cyber-attack plans IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 221 - 228