共 50 条
- [1] Escape method of malicious traffic based on backdoor attack [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (04): : 73 - 83
- [2] Adaptive unknown input observer-based detection and identification method for intelligent transportation under malicious attack [J]. MEASUREMENT & CONTROL, 2023, 56 (7-8): : 1377 - 1386
- [3] Malicious ICMP tunneling:: Defense against the vulnerability [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 226 - 236
- [4] Research of malicious code attack effect based on synthetic entropy method [J]. Li, P. (lipeng@njupt.edu.cn), 1600, Chinese Institute of Electronics (22):
- [6] Identification method for malicious traffic in industrial Internet under new unknown attack scenarios [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (06): : 75 - 86
- [7] Malicious Websites Identification Based on Active-Passive Method [J]. CYBER SECURITY, CNCERT 2018, 2019, 970 : 109 - 121
- [8] Mitigation of DHCP starvation attack [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (05) : 1115 - 1128
- [9] Support vector machine based ICMP covert channel attack detection [J]. COMPUTER NETWORK SECURITY, 2003, 2776 : 461 - 464
- [10] A New Attack Method for Malicious Nodes in Tangle Network [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2020), 2020, : 84 - 87