共 50 条
- [21] A Taxonomy of Attacks Using BGP Blackholing [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 107 - 127
- [22] A taxonomy and survey of attacks on digital signatures [J]. COMPUTERS & SECURITY, 2013, 34 : 67 - 112
- [23] Taxonomy of Cyber Attacks and Simulation of their Effects [J]. MILITARY MODELING & SIMULATION SYMPOSIUM 2011 (MMS 2011) - 2011 SPRING SIMULATION MULTICONFERENCE - BK 7 OF 8, 2011, : 73 - 80
- [24] Taxonomy of attacks on Industrial Control protocols [J]. 2015 INTERNATIONAL CONFERENCE ON PROTOCOL ENGINEERING (ICPE) AND INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF DISTRIBUTED SYSTEMS (NTDS), 2015,
- [25] Mobile Botnet Attacks: A Thematic Taxonomy [J]. NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2014, 276 : 153 - 164
- [26] A Taxonomy of Distributed Denial of Service Attacks [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 100 - 107
- [28] Rational Protection Against Timing Attacks [J]. 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 526 - 536
- [29] A Rational Protocol Treatment of 51% Attacks [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 3 - 32
- [30] Rational Protocols and Attacks in Blockchain System [J]. Chen, Yuling (ylchen3@gzu.edu.cn), 1600, Hindawi Limited (2020):