共 50 条
- [31] Trust management and network layer security protocols SECURITY PROTOCOLS, 2000, 1796 : 109 - 118
- [32] Network Security Policies: Verification, Optimization and Testing 2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 584 - 584
- [33] Wireless Network Penetration Testing and Security Auditing 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
- [35] Open Radio Access Network RIC Empowered Reconfigurable Intelligent Surface: A Physical-Layer Security Perspective IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2 : 615 - 625
- [36] Network Protocol Security Testing Based on Fuzz PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 955 - 958
- [37] A STUDY OF NETWORK SECURITY USING PENETRATION TESTING 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 371 - 374
- [38] Security Testing of Active Optical Network Devices 2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 9 - 13
- [39] The Study on Network Security Strategy based on Security Evaluation COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
- [40] Testing antivirus engines to determine their effectiveness as a security layer 2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,