搜索筛选:
搜索耗时3.7062秒,为你在为你在102,285,761篇论文里面共找到 4 篇相符的论文内容
类      型:
[期刊论文] 作者:Juan Wang,Yuan Shi,Guojun Peng, 来源:中国通信:英文版 年份:2016
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country...
[期刊论文] 作者:Yu Liang,Guojun Peng,Yuan Luo,Huanguo Zhang, 来源:中国通信(英文版) 年份:2016
Defending against ret-oriented programing (ROP) attacks is extremely challenging for mod operating systems.As the most popular mobile OS running on ARM,Android...
[期刊论文] 作者:Yuan Luo,Long Cheng,Yu Liang,Jianming Fu,Guojun Peng, 来源:中国通信:英文版 年份:2021
Cyber-physical systems(CPS)have been widely deployed in critical infrastructures and are vulnerable to various attacks.Data integrity attacks manipulate sensor measurements and cause control systems to fail,which are one of the prominent th......
[期刊论文] 作者:Juan Wang,Yuan Shi,Guojun Peng,Huanguo Zhang,Bo Zhao,Fei Yan,Fajiang Yu,Liqiang Zhang,, 来源:中国通信 年份:2016
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country...
相关搜索: