Cited By
View all- Li SShi SXiao YZhang CHou YLou W(2023)Bijack: Breaking Bitcoin Network with TCP VulnerabilitiesComputer Security – ESORICS 202310.1007/978-3-031-51479-1_16(306-326)Online publication date: 25-Sep-2023
- Ru KZheng YFeng XWang D(2021)The Side-Channel Vulnerability in Network ProtocolProceedings of the 2021 11th International Conference on Communication and Network Security10.1145/3507509.3507510(1-8)Online publication date: 3-Dec-2021
- Fu CLi QShen MXu KKim YKim JVigna GShi E(2021)Realtime Robust Malicious Traffic Detection via Frequency Domain AnalysisProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484585(3431-3446)Online publication date: 12-Nov-2021
- Show More Cited By