共 50 条
- [1] On countermeasures to traffic analysis attacks [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 188 - 195
- [2] Active traffic analysis attacks and countermeasures [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 31 - 39
- [3] Countermeasures against traffic analysis attacks in wireless sensor networks [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 113 - 124
- [4] Power analysis attacks and countermeasures [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 535 - 543
- [5] Analysis of phishing attacks and countermeasures [J]. MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 339 - +
- [6] Analysis of Cloud Computing Attacks and Countermeasures [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 117 - 123
- [7] An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures [J]. 2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, : 119 - 124
- [8] Attacks and Countermeasures on 802.16: Analysis and Assessment [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 487 - 514
- [9] Analysis of Signature Wrapping Attacks and Countermeasures [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, 2009, : 575 - 582
- [10] Analytical Modelling and Traffic Control Analysis of Security Attacks for Cloud Computing [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 453 - 457