端口监视专家Attacker
出处
《计算机应用文摘》
2003年第6期46-46,共1页
Chinese Journal of Computer Application
-
1PortLogger V1.2[J].黑客防线,2004(10).
-
2HUANG XueZhen,LIU JiQiang,HAN Zhen,YANG Jun.Privacy beyond sensitive values[J].Science China(Information Sciences),2015,58(7):166-180. 被引量:4
-
3李毅超,王钰,夏梦芹,曾家智.伪装IP追踪技术综述[J].计算机科学,2003,30(5):145-149. 被引量:2
-
4Huan Ma,Hao Ding,Yang Yang,Zhenqiang Mi,James Yifei Yang,Zenggang Xiong.Bayes-Based ARP Attack Detection Algorithm for Cloud Centers[J].Tsinghua Science and Technology,2016,21(1):17-28. 被引量:1
-
5李剑,宋丹劼,郭晓静,谢丰,彭勇.ID Updating-Based RFID Mutual Authentication Protocol for Low-Cost Tags[J].China Communications,2011,8(7):122-127. 被引量:1
-
6ZHANG Hengwei,YU Dingkun,WANG Jindong,HAN Jihong,WANG Na.Security Defence Policy Selection Method Using the Incomplete Information Game Model[J].China Communications,2015,12(S2):123-131. 被引量:2
-
7WANGXiao-yun,YANGLi-zhen,CHENKe-fei.SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks[J].Wuhan University Journal of Natural Sciences,2005,10(1):127-131. 被引量:12
-
8滕猛,邹鹏,王怀民.主动安全技术发展综述[J].计算机科学,2003,30(6):27-30.
-
9Debiao HE,Neeraj KUMAR,Han SHEN,Jong-Hyouk LEE.One-to-many authentication for access control in mobile pay-TV systems[J].Science China(Information Sciences),2016,59(5):114-128. 被引量:1
-
10ShaoHai-mei,MeiTian-can,QinQian-qing.Spread Spectrum Watermark Based on Wavelet Transform for Still Digital Image[J].Wuhan University Journal of Natural Sciences,2004,9(2):203-208.
;