共 50 条
- [32] Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 955 - 966
- [35] Risk Assessment by Dynamic Representation of Vulnerability, Exploitation, and Impact [J]. CYBER SENSING 2015, 2015, 9458
- [36] Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INTERNET (ICII 2018), 2018, : 139 - 145
- [37] VULNERABILITY OF PESTS - STUDY AND EXPLOITATION FOR SAFER CHEMICAL CONTROL [J]. ACS SYMPOSIUM SERIES, 1987, 336 : 54 - 76
- [38] Hands-on Lab on Smart City Vulnerability Exploitation [J]. 2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1777 - 1782
- [39] Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach [J]. APPLIED SCIENCES-BASEL, 2023, 13 (22):
- [40] Research on Automatic Exploitation of House of Spirit Heap Overflow Vulnerability [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 751 - 757