共 50 条
- [11] An Architectural approach to preventing code injection attacks [J]. 37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 30 - +
- [12] An approach for detecting and preventing DDoS attacks in campus [J]. Merouane, Mehdi (mmehdi_m@hotmail.com), 1600, Springer Science and Business Media, LLC (51): : 13 - 23
- [14] The influence of insider law on preventing insider information leakage [J]. Metallurgical and Mining Industry, 2015, 7 (09): : 446 - 451
- [16] Complexity of Insider Attacks to Databases [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 25 - 32
- [18] A Proactive Approach to Preventing Phishing Attacks Using a Pshark [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 915 - 921
- [19] Detecting and Preventing SQL Injection Attacks: A Formal Approach [J]. 2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 123 - 129
- [20] Insider attacks: human-factors attacks and mitigation [J]. Computer Fraud and Security, 2021, 2021 (05): : 14 - 17