共 50 条
- [1] A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments [J]. UBIQUITOUS SECURITY, 2022, 1557 : 171 - 188
- [2] PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities [J]. 51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2021), 2021, : 161 - 173
- [5] STORK: a real, heterogeneous, large-scale eID management system [J]. International Journal of Information Security, 2018, 17 : 569 - 585
- [6] KEY FACTORS FOR IMPROVING LARGE-SCALE HYDROLOGICAL MODEL PERFORMANCE [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND TECHNOLOGY, 2013,
- [8] A Large-Scale Study on Vulnerabilities in Linux using Vtopia [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 1033 - 1042
- [9] Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (04):
- [10] Security Improvement on An Efficient Key Distribution Mechanism for Large-scale Wireless Sensor Network [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 140 - 143