共 50 条
- [41] Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 419 - 440
- [42] Security against Sybil Attack in Wireless Sensor Network through Location Verification DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 187 - +
- [43] A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network INTERSPEECH 2022, 2022, : 4770 - 4774
- [45] Deployment of Source Address Validation by Network Operators: A Randomized Control Trial 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2361 - 2378
- [46] Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 465 - 480
- [47] A Two-Level Source Address Spoofing Prevention based on Automatic Signature and Verification Mechanism 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 621 - 626
- [49] An Attack-Resilient Source Authentication Protocol in Controller Area Network 2017 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2017, : 109 - 118
- [50] A geometrical based procedure for source separation mapped to a neural network FROM NATURAL TO ARTIFICIAL NEURAL COMPUTATION, 1995, 930 : 898 - 905