-
841
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01Subjects: Get full text
Article -
842
Measuring and analyzing node families in the Tor anonymous communication network
Published 2015-02-01Subjects: Get full text
Article -
843
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01Subjects: Get full text
Article -
844
-
845
Research on active defense based on multi-stage cyber deception game
Published 2020-08-01Subjects: “…cyber attack and defense…”
Get full text
Article -
846
Research on the SQL injection filtering based on SQL syntax tree
Published 2016-11-01Subjects: “…SQL injection attack…”
Get full text
Article -
847
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Subjects: Get full text
Article -
848
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01Subjects: Get full text
Article -
849
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01Subjects: Get full text
Article -
850
Key path analysis method for large-scale industrial control network
Published 2021-12-01Subjects: Get full text
Article -
851
Position related lightweight Sybil detection approach in VANET
Published 2017-04-01Subjects: “…Sybil attack…”
Get full text
Article -
852
Design and implementation of hardware-based dynamic instruction set randomization framework
Published 2017-11-01Subjects: “…code injection attack…”
Get full text
Article -
853
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Subjects: “…public key replacement attack…”
Get full text
Article -
854
Nano-zeolite-modified concrete: A comprehensive study of mechanical properties, corrosion resistance, and microstructural of concrete under varied exposure conditions
Published 2025-03-01Subjects: “…Internal and external chloride and sulphate attack…”
Get full text
Article -
855
Privacy Auditing in Differential Private Machine Learning: The Current Trends
Published 2025-01-01Subjects: Get full text
Article -
856
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01Subjects: Get full text
Article -
857
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Subjects: Get full text
Article -
858
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01Subjects: Get full text
Article -
859
Review of cryptographic application security evaluation techniques for new critical infrastructures
Published 2023-12-01Subjects: Get full text
Article -
860
Shamir-based virtual machine placement policy
Published 2019-10-01Subjects: “…co-resident attack…”
Get full text
Article