共 50 条
- [21] Information seeking behavior in new searching environments COLIS 2 - SECOND INTERNATIONAL CONFERENCE ON CONCEPTIONS OF LIBRARY AND INFORMATION SCIENCE: INTEGRATION IN PERSPECTIVE, PROCEEDINGS, 1996, : 403 - 416
- [23] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
- [25] Analysis and Its solution on Security Threats in SIP-based Mobility Support Environments IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 686 - +
- [26] Static detection and simulation of malicious code in a metallurgical master control station based on behavior information gain Engineering Intelligent Systems, 2020, 28 (01): : 15 - 22
- [29] Threats and risks to information security: A practical analysis of free access wireless networks PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH ENERGY PHYSICS EXPERIMENTS 2017, 2017, 10445
- [30] Social Media Information Security Threats: Anthropomorphic Emoji Analysis on Social Engineering IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 185 - 192