共 50 条
- [41] Launching Adversarial Label Contamination Attacks Against Malicious URL Detection [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 69 - 82
- [42] A segment-based approach of defending against buffer overflow attacks [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 430 - 432
- [44] MCR Decoding: A MIMO Approach for Defending Against Wireless Jamming Attacks [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 133 - 138
- [46] An SDN-based Approach For Defending Against Reflective DDoS Attacks [J]. PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 299 - 302
- [47] A Cooperative approach for Malicious Node Detection in impromptu Wireless Networks [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
- [48] Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1665 - 1677
- [49] Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET<bold> </bold> [J]. 2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 121 - 126
- [50] CRCMD&R: Cluster and Reputation based Cooperative Malicious Node Detection & Removal Scheme in MANETs [J]. PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 336 - 340