Hacking an optics manufacturing machine: You don't see it coming?!
暂无分享,去创建一个
[1] Wei Qi Yan,et al. An Overview of Penetration Testing , 2014, Int. J. Digit. Crime Forensics.
[2] Maher Salem,et al. Mining Techniques in Network Security to Enhance Intrusion Detection Systems , 2012, ArXiv.
[3] Ryan K. L. Ko,et al. A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[4] Marjan Gusev,et al. Architecture Of A Identity Based Firewall System , 2011, ArXiv.
[5] LongJuan Wang,et al. Research on the Principle and analysis of Shellshock bug , 2015 .
[6] Rafael Uetz,et al. Software Vulnerability Analysis Using CPE and CVE , 2017, ArXiv.