共 50 条
- [22] A deep learning approach for detecting security attacks on blockchain CEUR Workshop Proceedings, 2020, 2597 : 212 - 222
- [23] Distributed Service Control Technique for Detecting Security Attacks 2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 574 - 577
- [24] Security in Process: Detecting Attacks in Industrial Process Data THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
- [26] Timing attacks in security protocols: Symbolic framework and proof techniques Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 280 - 299
- [27] Design Requirements to Counter Parallel Session Attacks in Security Protocols 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 298 - 305
- [28] Security and efficiency in authentication protocols resistant to password guessing attacks LCN'97 - 22ND ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 1997, : 245 - 252
- [29] On the security of Girault key agreement protocols against active attacks IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (05): : 1181 - 1189
- [30] Planning attacks to security protocols: Case studies in logic programming COMPUTATIONAL LOGIC: LOGIC PROGRAMMING AND BEYOND, PT I: ESSAYS IN HONOUR OF ROBERT A KOWALSKI, 2002, 2407 : 533 - 560