-
721
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Published 2025-01-01Subjects: Get full text
Article -
722
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
723
-
724
Novel defense based on softmax activation transformation
Published 2022-04-01Subjects: Get full text
Article -
725
-
726
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01Subjects: Get full text
Article -
727
-
728
Altered Atlas of Exercise-Responsive MicroRNAs Revealing miR-29a-3p Attacks Armored and Cold Tumors and Boosts Anti-B7-H3 Therapy
Published 2025-01-01“…In conclusion, we uncovered that miR-29a-3p is a critical exercise-responsive miRNA, which attacked armored and cold tumors by inhibiting B7-H3 expression. …”
Get full text
Article -
729
Secure IoT data dissemination with blockchain and transfer learning techniques
Published 2025-01-01Subjects: Get full text
Article -
730
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: Get full text
Article -
731
Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
Published 2008-01-01Subjects: Get full text
Article -
732
MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN
Published 2023-01-01Subjects: “…cyber-attacks…”
Get full text
Article -
733
Dynamic and heterogeneous Byzantine system in cloud
Published 2018-05-01Subjects: Get full text
Article -
734
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article -
735
Novel blind audio watermarking algorithm in the hybrid domain
Published 2007-01-01Subjects: Get full text
Article -
736
Adversarial sample generation algorithm for vertical federated learning
Published 2023-08-01Subjects: Get full text
Article -
737
Resilience characterization and evaluation model of field area network for the power distribution network
Published 2022-09-01Subjects: Get full text
Article -
738
Application of adversarial machine learning in network intrusion detection
Published 2021-11-01Subjects: Get full text
Article -
739
Information flow integrity measurement method using integrity threat tree
Published 2019-04-01Subjects: Get full text
Article -
740
Security risk analysis and evaluation techniques in power information system cloud
Published 2018-02-01Subjects: Get full text
Article