共 50 条
- [22] Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,
- [26] Position paper: Prolepsis on the problem of Trojan-horse-based integrity attacks NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, 1999, : 48 - 51
- [27] Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
- [29] Nanodiamonds act as Trojan horse for intracellular delivery of metal ions to trigger cytotoxicity Particle and Fibre Toxicology, 12
- [30] Nanodiamonds act as Trojan horse for intracellular delivery of metal ions to trigger cytotoxicity PARTICLE AND FIBRE TOXICOLOGY, 2015, 12