共 50 条
- [21] Case Study on the Bluetooth Vulnerabilities in Mobile Devices INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (04): : 125 - 129
- [22] Kerberos V5: Vulnerabilities and perspectives PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
- [23] Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack 2017 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2017, : 550 - 554
- [24] Perceived structural vulnerabilities among detained noncitizen immigrants in Minnesota PLOS ONE, 2021, 16 (06):
- [27] In the Bullseye of Vigilantes: Mediated Vulnerabilities of Kyrgyz Labour Migrants in Russia MEDIA AND COMMUNICATION, 2019, 7 (02): : 230 - 241
- [30] Social Psychological Perspectives on Islandness: Identities, Vulnerabilities and Precarities ISLAND STUDIES JOURNAL, 2024, 19 (01):