Cited By
View all- Li XXu WLiu BZhang MLi ZZhang JChang DZheng XWang CChen JDuan HLi Q(2024)TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00172(4459-4477)Online publication date: 19-May-2024
- Gu YYing LChai HPu YDuan HGao X(2024)More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00138(1179-1197)Online publication date: 19-May-2024
- Khaloopour LSu YRaskob FMeuser TBless RJanzen LAbedi KAndjelkovic MChaari HChakraborty PKreutzer MHollick MStrufe TFranchi NJamali V(2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
- Show More Cited By