共 50 条
[42]
Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures
[J].
PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21),
2021,
:89-100
[43]
Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains
[J].
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018),
2019,
[44]
Security and Privacy Threats to On-Chip Non-Volatile Memories and Countermeasures
[J].
2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD),
2016,
[46]
A Weighted Machine Learning-Based Attacks Classification to Alleviating Class Imbalance
[J].
IEEE SYSTEMS JOURNAL,
2021, 15 (04)
:4780-4791
[48]
Applications of Machine Learning in Hardware Security
[J].
2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022),
2022,
:212-213
[50]
Security for the Metaverse: Blockchain and Machine Learning Techniques for Intrusion Detection
[J].
IEEE NETWORK,
2024, 38 (05)
:204-212