共 50 条
- [31] CAUDIT: Continuous Auditing of SSH Servers to Mitigate Brute-Force Attacks [J]. PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2019, : 667 - 682
- [33] A Statistical Analysis of Large Passwords Lists, Used to Optimize Brute Force Attacks [J]. 4TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 111 - 128
- [34] Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 485 - 489
- [38] Scheduling in Multichannel Wireless Networks with Flow-Level Dynamics [J]. SIGMETRICS 2010: PROCEEDINGS OF THE 2010 ACM SIGMETRICS INTERNATIONAL CONFERENCE ON MEASUREMENT AND MODELING OF COMPUTER SYSTEMS, 2010, 38 (01): : 191 - 202
- [39] On the Design of Irregular HetNets with Flow-Level Traffic Dynamics [J]. 2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
- [40] SubFlow: Towards Practical Flow-Level Traffic Classification [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2541 - 2545