共 15 条
[1]
Bar-Yanai R, 2010, LECT NOTES COMPUT SC, V6049, P373, DOI 10.1007/978-3-642-13193-6_32
[3]
Cohen F., 1997, Network Security, P11, DOI 10.1016/S1353-4858(97)88551-0
[4]
Dyer K.P., 2012, IACR Cryptology ePrint Archive, V2012, P494
[5]
Hernacki B., 2005, Information Security Technical Report, V10, P140, DOI 10.1016/j.istr.2005.07.003
[6]
Hjelmvik E., 2010, 123751 CHALM U TECHN
[7]
Khan H., 2013, WIRESPEED PRIV UNPUB
[8]
Maestre J. Vidal, 2013, ICIT 2013 6 INT C IN
[9]
Mohajeri Moghaddam H., 2012, P 2012 ACM C COMPUTE, P97, DOI DOI 10.1145/2382196.2382210
[10]
Ptacek T. H., 1998, INSERTION EVASION DE