美文网首页
8.2 相关论文

8.2 相关论文

作者: 最酷的崽_ec69 | 来源:发表于2019-12-06 09:40 被阅读0次

8.2.1. 流量分析

  • Plohmann D, Yakdan K, Klatt M, et al. A comprehensive measurement study of domain generating malware[C]//25th {USENIX} Security Symposium ({USENIX} Security 16). 2016: 263-278.

8.2.2. 漏洞自动化

  • Staicu C A, Pradel M, Livshits B. SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE. JS[C]//NDSS. 2018.
  • Atlidakis V , Godefroid P , Polishchuk M . REST-ler: Automatic Intelligent REST API Fuzzing[J]. 2018.

8.2.3. 攻击技巧

  • Lekies S, Kotowicz K, Groß S, et al. Code-reuse attacks for the web: Breaking cross-site scripting mitigations via script gadgets[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017: 1709-1723.
  • Papadopoulos P, Ilia P, Polychronakis M, et al. Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation[J]. arXiv preprint arXiv:1810.00464, 2018.

8.2.4. 攻击检测

  • Liu T, Qi Y, Shi L, et al. Locate-then-detect: real-time web attack detection via attention-based deep neural networks[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence. AAAI Press, 2019: 4725-4731.

8.2.5. 隐私

  • Klein A, Pinkas B. DNS Cache-Based User Tracking[C]//NDSS. 2019.

8.2.6. 指纹

  • Hayes J, Danezis G. k-fingerprinting: A robust scalable website fingerprinting technique[C]//25th {USENIX} Security Symposium ({USENIX} Security 16). 2016: 1187-1203.

8.2.7. 侧信道

  • Rosner N, Kadron I B, Bang L, et al. Profit: Detecting and Quantifying Side Channels in Networked Applications[C]//NDSS. 2019.

8.2.8. 认证

  • Ghasemisharif M, Ramesh A, Checkoway S, et al. O single sign-off, where art thou? an empirical analysis of single sign-on account hijacking and session management on the web[C]//27th {USENIX} Security Symposium ({USENIX} Security 18). 2018: 1475-1492.

相关文章

  • 8.2 相关论文

    8.2.1. 流量分析 Plohmann D, Yakdan K, Klatt M, et al. A compr...

  • 论文相关

    https://blog.csdn.net/myofficials/article/details/7904496...

  • 论文相关

    论文方面要做的--> threasholdModel.m文件看懂 把那个公式改下,然后跑SF网络 画pre里的fi...

  • SLAM论文相关

    1. SLAM论文 1.1 SOFT-SLAM:Computationally efficient stereo ...

  • 论文相关概念

    最近看了许多论文,有一些概念本来也无关紧要,但是看得多了也就自然而然的懂了,在这里分享给大家。 1. Transa...

  • BFT相关论文

    1999 “Authenticated Byzantine Fault Tolerance Without Pub...

  • 论文相关知识

    1.核心期刊 CCL,全国计算语言学学术会议 ACL,国际计算语言年会 NIPS,神经信息处理系统进展大会 SCI...

  • owens相关论文

    Ambient sound provides supervision for visual learning 论文...

  • 论文写作相关

    不知道哪里找出来一个word文档,里面是大杂烩式的科研相关写作指南,出处不可考所以没有link了。原文有标注来源的...

  • 相关的论文

    Making connections: Social networks in international busi...

网友评论

      本文标题:8.2 相关论文

      本文链接:https://www.haomeiwen.com/subject/kffovctx.html