共 50 条
- [1] Security Analysis of DeFi: Vulnerabilities, Attacks and Advances [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 488 - 493
- [2] Security Risk Analysis for Asset in relation to Vulnerability, Probability of Threats and Attacks [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 16 - 20
- [4] Analysis of SCADA System Vulnerabilities to DDoS Attacks [J]. 2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
- [5] A Survey on Security Issues, Vulnerabilities and Attacks in Android based Smartphone [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2017, : 40 - 46
- [6] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
- [7] Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations [J]. IEEE NETWORK, 2023, 37 (01): : 111 - 117
- [8] Virtualized Network Functions Security Attacks and Vulnerabilities [J]. 2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
- [9] SECURITY SYSTEM VULNERABILITIES [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 175 - 179
- [10] Research of Information System Security Risk Management based on Probability Model and Security Entropy [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE), 2017, 190 : 414 - 420