共 50 条
- [1] Practical Attacks Against Graph-based Clustering [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1125 - 1142
- [2] Optimizing detection of malware attacks through Graph-based approach [J]. 2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC), 2017, : 87 - 91
- [4] An Approach of DNS Protection Against DDoS Attacks [J]. 2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), 2017, : 140 - 143
- [5] Research on An Effective Approach against DDoS Attacks [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 21 - +
- [6] An SDN-based Approach For Defending Against Reflective DDoS Attacks [J]. PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 299 - 302
- [7] Protection Against Graph-Based False Data Injection Attacks on Power Systems [J]. IEEE Transactions on Control of Network Systems, 2024, 11 (04): : 1924 - 1936
- [8] Poisoning Attacks to Graph-Based Recommender Systems [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 381 - 392
- [9] Graph-based improvement of edit distance attacks [J]. COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING VOL 1: THEORY AND COMPUTATION: OLD PROBLEMS AND NEW CHALLENGES, 2007, 963 : 627 - +