共 50 条
- [2] Mitigating Browser-based DDoS Attacks using CORP [J]. PROCEEDINGS OF THE 10TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, 2017, : 137 - 146
- [3] iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2038 - 2052
- [4] Browser-Based CPU Fingerprinting [J]. COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 87 - 105
- [5] Browser model for security analysis of browser-based protocols [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 489 - 508
- [7] Browser-Based Intrusion Prevention System [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 371 - 373
- [8] A Browser-Based Kerberos Authentication Scheme [J]. COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 115 - +
- [9] A first look at browser-based cryptojacking [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 58 - 66
- [10] BREF - BRowser-based Evaluation Framework [J]. DIS'17 COMPANION: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON DESIGNING INTERACTIVE SYSTEMS, 2017, : 313 - 316