共 50 条
- [1] Spatial Signature Method (SSM) Against XML Signature Wrapping Attacks [J]. ENGINEERING APPLICATION OF ARTIFICIAL INTELLIGENCE CONFERENCE 2018 (EAAIC 2018), 2019, 255
- [2] Making XML Signatures Immune to XML Signature Wrapping Attacks [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 151 - 167
- [3] Power analysis attacks and countermeasures [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 535 - 543
- [4] Analysis of phishing attacks and countermeasures [J]. MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 339 - +
- [5] On countermeasures to traffic analysis attacks [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 188 - 195
- [6] Analysis of Cloud Computing Attacks and Countermeasures [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 117 - 123
- [7] BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature Scheme [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 61 - 71
- [8] An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures [J]. 2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, : 119 - 124
- [9] Active traffic analysis attacks and countermeasures [J]. 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 31 - 39
- [10] Attacks and Countermeasures on 802.16: Analysis and Assessment [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 487 - 514