共 26 条
[1]
Towards Secure Network Coding Enabled Mobile Small Cells
[J].
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM),
2019,
[2]
Dayal M, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P497, DOI 10.1109/CCAA.2016.7813770
[3]
Joan D., 2002, The design of Rijndael
[4]
Karabatak M., 2018, 6 INT S DIGITAL FORE, P1, DOI DOI 10.1109/ISDFS.2018.8355357
[5]
Kavisankar L., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P251, DOI 10.1109/ICRTIT.2011.5972435
[6]
Kumar S., 2007, Internet Monitoring and Protection, P25, DOI [10.1109/ICIMP.2007.42, DOI 10.1109/ICIMP.2007.42]
[7]
Lalos A. S., 2019, SECURITY QUALITY CYB, P443
[8]
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities
[J].
IEEE ACCESS,
2019, 7
:182004-182016
[9]
Mekuria Rufael., 2016, IEEE QOMEX 16 P IEEE
[10]
Rolling With Confidence: Managing the Complexity of DNSSEC Operations
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2019, 16 (03)
:1199-1211