共 179 条
[1]
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]
Abomhara M., 2015, Journal of Cyber Security and Mobility, V2015, P65
[3]
Abusnaina Ahmed., 2021, IEEE Transactions on Dependable and Secure Computing
[4]
Al-Rfou R, 2016, arXiv
[5]
Alasmaiy H., 2019, IEEE INTERNET THINGS, V6, P77
[6]
Alasmary H., 2021, IEEE INTERNET THINGS, V1
[7]
Alazab M., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P52, DOI 10.1109/CTC.2010.8
[9]
Alrawi O, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3505
[10]
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513