共 50 条
- [1] Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks [J]. 2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1579 - 1584
- [2] A schedule randomization policy to mitigate timing attacks in WirelessHART networks [J]. Real-Time Systems, 2020, 56 : 452 - 489
- [3] Information Theoretical Evaluation of the Bucketing Technique to Mitigate Timing Attacks [J]. 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 561 - 565
- [5] Cooperated Traffic Shaping With Traffic Estimation and Path Reallocation to Mitigate Microbursts in IoT Backhaul Network [J]. IEEE ACCESS, 2021, 9 : 162190 - 162196
- [7] Traffic Shaping Impact of Network Coding on Spectrum Predictability and Jamming Attacks [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 293 - 298
- [8] "They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 632 - 649
- [9] FASE: Fast Selective Flushing to Mitigate Contention-based Cache Timing Attacks [J]. PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, 2022, : 541 - 546
- [10] Web Fingerprint Defense with Timing-assistant Traffic Burst Shaping [J]. 2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023, 2023, : 333 - 340