共 21 条
- [1] Protecting Web Browser Extensions from Java']JavaScript Injection Attacks 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 188 - 197
- [2] On Protecting IJTAG from Data Sniffing and Alteration Attacks 2022 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2022), 2022, : 146 - 151
- [3] Asset management from your web browser 2002, South African Institute of Electrical Engineers (19):
- [4] LATEX GLOVES: Protecting Browser Extensions from Probing and Revelation Attacks 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
- [5] Protecting Web Servers from Octopus Attacks INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET , PROCEEDINGS, 2006, : 82 - +
- [6] Protecting Your Voice from Speech Synthesis Attacks 39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 394 - 408
- [7] WebSOS: Protecting web servers from DDoS attacks ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 461 - 466
- [8] Running your existing applications from a remote Web browser across the Internet TOWARD AN ELECTRONIC HEALTH RECORD EUROPE '97 - CONFERENCE ON THE CREATION OF A EUROPEAN ELECTRONIC HEALTH RECORD, CONFERENCE PROCEEDINGS, 1997, : 304 - 309
- [9] DATCONS: Protecting Web-Based QoS from DDoS Attacks 2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 935 - 938
- [10] Protecting Web Services from DoS attacks by SOAP message validation SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 171 - +