Publisher
Springer Science and Business Media LLC
Subject
Control and Optimization,Aerospace Engineering,Control and Systems Engineering
Reference26 articles.
1. Daswani, N., Kern, C., & Kesavan, A. (2007). Foundations of Security: What Every Programmer Needs to Know. Dreamtech Press.
2. Zheng, G., Ma, H.-T., Cheng, C., & Tu, Y.-C. (2012). Design and logical analysis on the access authentication scheme for satellite mobile communication networks. IET Information Security, 6(1), 6–13.
3. Villalba, L. G., Matesanz, J. G., Canas, D. R., & Orozco, A. S. (2011). Secure extension to the optimised link state routing protocol. IET Information Security, 5(3), 163–169.
4. Ueda, H., Kurachi, R., Takada, H., Mizutani, T., Inoue, M., & Horihata, S. (2015). Security authentication system for in-vehicle network. SEI Technical Review, 81, 5–9.
5. Sun, C., Hu, C., & Liu, B. (2012). Sack2: Effective SYN flood detection against skillful spoofs. IET Information Security, 6(3), 149–156.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献