Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
暂无分享,去创建一个
Agostino Cortesi | Ruffin White | Gianluca Caiazza | Henrik Christensen | Chenxu Jiang | Xinyue Ou | Zhiyue Yang
[1] Alessandro Orso,et al. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks , 2006, SIGSOFT '06/FSE-14.
[2] Agostino Cortesi,et al. Procedurally Provisioned Access Control for Robotic Systems , 2018, 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[3] Dong-Seong Kim,et al. Node discovery scheme of DDS using dynamic bloom filters , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).
[4] Aniruddha S. Gokhale,et al. Publish/subscribe-enabled software defined networking for efficient and scalable IoT communications , 2015, IEEE Communications Magazine.
[5] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[6] Ke Ci,et al. Hacking Exposed : Network Security Secrets and Solutions , 2013 .
[7] Jerry den Hartog,et al. Formal analysis of XACML policies using SMT , 2017, Comput. Secur..
[8] Laurent Vanbever,et al. NetHide: Secure and Practical Network Topology Obfuscation , 2018, USENIX Security Symposium.
[9] Richard Ruggles,et al. An Empirical Approach to Economic Intelligence in World War II , 1947 .
[10] Javier Povedano-Molina,et al. Bloom filter-based discovery protocol for DDS middleware , 2011, J. Parallel Distributed Comput..