共 50 条
- [21] Is voice transformation a threat to speaker identification? [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 4845 - 4848
- [23] Threat to gender representation: Identity and identification [J]. JOURNAL OF PERSONALITY, 1998, 66 (03) : 335 - 357
- [24] Brown Threat: Identification in the Security State [J]. JOURNAL OF COMMUNICATION, 2017, 67 (04) : E9 - E11
- [25] Threat identification and prediction system (TIPS) [J]. IKE '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE ENGNINEERING, 2004, : 20 - 27
- [26] Protection Without Detection: A Threat Mitigation Technique [J]. DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2012, 2012, 8405
- [28] Research of Threat Identification Based on Bayesian Networks [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5336 - 5338
- [29] Risk Identification: From Requirements to Threat Models [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 385 - 396
- [30] Integrated optic chip for laser threat identification [J]. SIGNAL PROCESSING, SENSOR FUSION, AND TARGET RECOGNITION XIX, 2010, 7697