暂无图片
暂无图片
暂无图片
暂无图片
暂无图片
2-被反转的网络:嵌入式安全的新观点-Alex Halderman.pdf
204
50页
0次
2021-02-23
50墨值下载
The Network Inside Out
New Vantage Points for Embedded Security
J. Alex Halderman
Mining Your Ps and Qs: Widespread Weak Keys in Network Devices
Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. A. Halderman
21st USENIX Security Symposium, Aug. 2012
ZMap: Fast Internet-Wide Scanning and Its Security Applications
Zakir Durumeric, Eric Wustrow, and J. A. Halderman
22nd USENIX Security Symposium, Aug. 2013
Illuminating Security Issues Surrounding Lights-Out Server Management
Anthony Bonkoski, Russ Bielawski, and J. A. Halderman
7th USENIX Workshop on Offensive Technologies (WOOT), Aug. 2013
Green Lights Forever: Analyzing the Security of Traffic Infrastructure
Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J.A. H.
8th USENIX Workshop on Offensive Technologies (WOOT), Aug. 2014
Security Analysis of a Full Body Scanner
Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort,
Eric Rescorla, Stephen Checkoway, J. Alex Halderman, and Hovav Shacham
23rd USENIX Security Symposium, Aug. 2014
Based on
joint work:
of 50
50墨值下载
【版权声明】本文为墨天轮用户原创内容,转载时必须标注文档的来源(墨天轮),文档链接,文档作者等基本信息,否则作者和墨天轮有权追究责任。如果您发现墨天轮中有涉嫌抄袭或者侵权的内容,欢迎发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。

评论

关注
最新上传
暂无内容,敬请期待...
下载排行榜
Top250 周榜 月榜