共 50 条
- [1] Information Theoretical Evaluation of the Bucketing Technique to Mitigate Timing Attacks 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 561 - 565
- [3] CINDAM: Customized Information Networks for Deception and Attack Mitigation 2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 114 - 119
- [4] Automatic Software Timing Attack Evaluation & Mitigation on Clear Hardware Assumption PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
- [5] Analysis of Insiders Attack Mitigation Strategies 2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 581 - 591
- [6] Analysis of Insiders Attack Mitigation Strategies 2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 611 - 618
- [7] Timing-sensitive information flow analysis for synchronous systems COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 243 - +
- [8] Transforming flow information during code optimization for timing analysis Real-Time Systems, 2010, 45 : 72 - 105
- [10] Random flow network modeling and simulations for DDoS attack mitigation 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 487 - 491