共 50 条
- [1] Avoid powerful tampering by malicious host GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 907 - 915
- [2] Malicious IoT Implants: Tampering with Serial Communication over the Internet RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 535 - 555
- [3] Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 2660 - 2667
- [4] Intelligent Deep Detection Method for Malicious Tampering of Cancer Imagery 2022 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MACHINE LEARNING APPLICATIONS (CDMA 2022), 2022, : 25 - 28
- [5] That's My DNA: Detecting Malicious Tampering of Synthesized DNA DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 61 - 80
- [6] MALICIOUS TAMPERING WITH FOODSTUFFS - THE FORENSIC SCIENTISTS ROLE IN THE POLICE INVESTIGATION JOURNAL OF THE SOCIETY OF DAIRY TECHNOLOGY, 1987, 40 (03): : 70 - 73
- [7] Malicious Wave: a Survey on Actively Tampering Using Electromagnetic Glitch 2014 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, TOKYO (EMC'14/TOKYO), 2014, : 318 - 321
- [9] Propagation Model of Derivative Rumor Considering Propagation Error and Malicious Tampering 2019 4TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2019), 2019, : 241 - 245