共 50 条
- [41] An analysis of Bluetooth security vulnerabilities [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
- [42] Ontology Model-Based Static Analysis of Security Vulnerabilities [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 330 - +
- [43] A novel approach to cyberspace security situation based on the vulnerabilities analysis [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4747 - +
- [48] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
- [49] RISK-BASED DESIGN BASED ON LIMITING THE PROBABILITY OF SYSTEM FAILURE AT A MINIMUM TOTAL COST [J]. RISK MANAGEMENT-AN INTERNATIONAL JOURNAL, 2008, 10 (02): : 104 - 121