共 50 条
- [42] Extensions of the Cube Attack Based on Low Degree Annihilators CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 87 - +
- [43] Analysis on Internet Attack and Security ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2387 - 2390
- [44] Researches on network security situation analysis based on attack states 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 640 - 646
- [45] Network security analysis model based on the increase in attack ability Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (12): : 2012 - 2019
- [46] Complex Network Security Analysis based on Attack Graph Model PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
- [47] Detection of Black Hole Attack Using Code Division Security Method EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 307 - 314
- [48] Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search Journal of Cryptographic Engineering, 2019, 9 : 375 - 392