共 50 条
[43]
Man-In-The-Middle attacks on Bluetooth:: A comparative analysis, a novel attack, and countermeasures
[J].
2008 3RD INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING, VOLS 1-3,
2008,
:1096-1102
[45]
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks
[J].
Int. J. Internet Protoc. Technol.,
2008, 2 (128-135)
:128-135
[46]
Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview
[J].
APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY,
2016, 651
:54-65
[47]
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2022, 136
:358-377
[48]
MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
[J].
2020 IEEE 14TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID),
2020,
:62-68