共 50 条
- [42] Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures [J]. PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 89 - 100
- [43] A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (06): : 973 - 997
- [44] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3723 - 3768
- [47] Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks [J]. 2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 102 - 107
- [48] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses [J]. IEEE ACCESS, 2021, 9 : 162401 - 162437