共 34 条
[2]
[Anonymous], P ACM C COMP COMM SE
[3]
Subversion-Resilient Signature Schemes
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:364-375
[5]
Bao T., 2017, P 38 IEEE S SEC PRIV
[6]
Automatic patch-based exploit generation is possible: Techniques and implications
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:143-+
[7]
Cavusoglu H., 2005, Fourth Workshop on the Economics of Information Security, P1
[8]
Clarke R.A., 2010, Cyber War The Next Threat To National Security and What To Do About It
[9]
Costa M., 2005, P 21 ACM SIGOPS S OP, P133