-
701
Study on choosing the parameter ε in differential privacy
Published 2015-12-01Subjects: Get full text
Article -
702
-
703
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Subjects: Get full text
Article -
704
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: Get full text
Article -
705
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
706
Le défi Charlie : les médias à l’épreuve des attentats
Published 2018-12-01Subjects: Get full text
Article -
707
-
708
-
709
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01Subjects: Get full text
Article -
710
-
711
Development and internal validation of a nomogram for predicting cognitive impairment after mild ischemic stroke and transient ischemic attack based on cognitive trajectories: a prospective cohort study
Published 2025-01-01“…IntroductionMany predictive models for cognitive impairment after mild stroke and transient ischemic attack are based on cognitive scales at a certain timepoint. …”
Get full text
Article -
712
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01Subjects: Get full text
Article -
713
Comparison of selected physical fitness components among male football players of different playing positions
Published 2015-11-01Subjects: “…agility; attackers; defenders; goalkeepers; midfielders; power; speed…”
Get full text
Article -
714
Differential fault analysis on EMV application cryptogram
Published 2016-04-01Subjects: Get full text
Article -
715
A FUZZY LOGIC MODEL FOR HUMAN DISTRESS DETECTION
Published 2024-01-01Subjects: “…distress detection, fuzzy logic, parameters, physical attack…”
Get full text
Article -
716
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
Published 2016-06-01Subjects: Get full text
Article -
717
The effects of war-related experiences on mental health symptoms of individuals living in conflict zones: a longitudinal study
Published 2025-01-01Subjects: Get full text
Article -
718
Performance research of the T′ algorithm over GF(2)
Published 2011-01-01Subjects: “…algebraic attacks…”
Get full text
Article -
719
A Network Traffic Classification Method for Class-Imbalanced Data
Published 2015-06-01Subjects: “…attack traffic…”
Get full text
Article -
720
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article