共 50 条
- [31] Topological Comparison Based Approach of Detecting Wormhole Attacks in OLSR Protocol 2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2010,
- [33] A collaborative control strategy for platoons of autonomous vehicles in the presence of message falsification attacks 2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 110 - 115
- [35] Countering Code Injection Attacks with TLB and I/O Monitoring 2010 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2010, : 370 - 375
- [38] UNIFYING STRATEGIES AND TACTICS: A SURVIVABILITY FRAMEWORK FOR COUNTERING CYBER ATTACKS ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 119 - +
- [39] Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust 2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 409 - 412