共 50 条
- [41] Selection of Malicious Attack Nodes for Complex Networks Based on Structural Controllability 2022 IEEE 17TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION, ICCA, 2022, : 636 - 641
- [42] Digital Image Watermarking for Malicious Attack ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 234 - +
- [45] Defeat Magic with Magic: A Novel Ransomware Attack Method to Dynamically Generate Malicious Payloads Based on PLC Control Logic APPLIED SCIENCES-BASEL, 2022, 12 (17):
- [46] Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 103 - 110
- [48] DDoS Attack Identification and Defense using SDN based on Machine Learning Method 2018 15TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS (I-SPAN 2018), 2018, : 166 - 170
- [49] A Malicious URL Detection Method Based on CNN 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 23 - 28
- [50] Person Re-identification Method Based on Color Attack and Joint Defence 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, : 4312 - 4321