共 50 条
- [1] Security issues and vulnerabilities of the SNMP protocol [J]. 2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 74 - 77
- [2] An Overview of the EMV Protocol and Its Security Vulnerabilities [J]. PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
- [3] Protocol fuzzing to find security vulnerabilities of RabbitMQ [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (23):
- [4] SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03): : 68 - 81
- [5] Analysis of Security Vulnerabilities and Countermeasures [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
- [6] An analysis of Bluetooth security vulnerabilities [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
- [7] Vulnerabilities of RFID Security Protocol Based on Chaotic Maps [J]. 2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2014, : 648 - 653
- [8] Study of security and effectiveness of DoIP in vehicle networks [J]. PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
- [9] On the Detection and Analysis of Software Security Vulnerabilities [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,