共 50 条
- [41] Camouflage of network traffic to resist attack (CONTRA) [J]. Proc. - DARPA Inf. Surviv. Conf. Expo., DISCEX, (126-127):
- [42] Camouflage of network traffic to resist attack (CONTRA) [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 126 - 127
- [43] Timing analysis of keystrokes and timing attacks on SSH [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 337 - 352
- [44] Camouflage Is All You Need: Evaluating and Enhancing Transformer Models Robustness Against Camouflage Adversarial Attacks [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024,
- [46] Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm [J]. Journal of Cryptographic Engineering, 2021, 11 : 369 - 397
- [48] ATM traffic policing and traffic shaping measurements [J]. PERFORMANCE AND CONTROL OF NETWORK SYSTEMS, 1997, 3231 : 230 - 246
- [49] Constitutional parasitism, camouflage, and pretense: Shaping citizenship through subterfuge [J]. ICON-INTERNATIONAL JOURNAL OF CONSTITUTIONAL LAW, 2023, 21 (01): : 285 - 307
- [50] TRAFFIC SHAPING FOR VBR TRAFFIC IN ATM NETWORKS [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1992, E75B (10) : 1105 - 1108