共 50 条
- [25] EMC design practices: Shielding - playing hide and seek EE: Evaluation Engineering, 1999, 38 (12):
- [28] Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 496 - 515
- [29] Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps 2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,