共 50 条
- [31] Performance Analysis of Security Attacks and Improvements of Routing Protocols in MANET 2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, COMPUTER ENGINEERING, AND SOCIAL MEDIA (CSCESM), 2015, : 163 - 169
- [32] A formal analysis of complex type flaw attacks on security protocols ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY, PROCEEDINGS, 2008, 5140 : 167 - +
- [33] Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 455 - 465
- [34] Collusion analysis of cryptographic protocols IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5
- [35] Fingerprints resistant to collusion attacks PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 15 (01): : 60 - 68
- [36] No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1343 - 1360
- [37] SPHINX: Detecting Security Attacks in Software-Defined Networks 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
- [38] SECURITY SYSTEM FOR DETECTING TAMPERING AND THERMAL SIDE CHANNEL ATTACKS UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2020, 82 (04): : 161 - 172
- [39] A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device IEEE ACCESS, 2018, 6 : 72862 - 72869
- [40] Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 306 - 311