6   Artículos

 
en línea
Hao Sun, Yuejin Du and Qi Li    
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Enze Wang, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo and Tai Yue    
At present, embedded devices have become a part of people?s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stat... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dmitry E. Gouriev,Olga R. Laponina,Eugeny E. Stenkin,Petr U. Demyanov     Pág. 43 - 64
Digital time division command/response multiplex data bus (MIL-STD-1553B) is used in onboard networks of air- and spacecraft, and in some other circumstances. Goals of design, debugging, and validation of interface devices make strong requirements for te... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »