Development of Information Security Contents for Learning Hacking Principles
暂无分享,去创建一个
[1] Seong Baeg Kim,et al. The Design and Analysis of a Hardware-based Anomaly Detection Scheme , 2012 .
[2] Kyung-Hwan Park,et al. A Keyboard Security Method Based on a Subclassing , 2011 .
[3] Sangjun Lee,et al. Efficient Technique for Preventing ARP Spoofing Attacks using Reliable ARP Table , 2011 .
[4] Baek-Young Choi,et al. E-LPG: Energy Efficient Location Privacy Scheme Against Global Attackers in Sensor Networks , 2013 .
[5] Hatem Hamad,et al. Secure Model for Educational Resources , 2013 .
[6] Dong-Hoon Lee,et al. The Effectiveness Evaluation Methods of DDoS Attacks Countermeasures Techniques using Simulation , 2012 .