共 50 条
- [41] LeakThief : Stealing the Behavior Information of Laptop via Leakage Current 2023 20TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING, SECON, 2023,
- [42] Information leakage via electromagnetic emanations and evaluation of Tempest countermeasures INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 167 - 179
- [44] Obtaining Information Leakage Bounds via Approximate Model Counting PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (PLDI): : 1488 - 1509
- [45] On the Leakage of Personally Identifiable Information Via Online Social Networks 2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09), 2009, : 7 - 12
- [46] Information leakage via electromagnetic emanation and effectiveness of averaging technique PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 98 - 101
- [48] Intranet case study: The role of the TGSLC information center in development of the Intranet COMPUTERS IN LIBRARIES '98, PROCEEDINGS, 1998, : 116 - 120
- [49] Data Leakage Prevention: E-Mail Protection via Gateway 10TH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2018, 933
- [50] Design and developing: an Intranet based comprehensive management information system for power generating stations Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering), 2001, 25 (01):