-
861
STRATEGIES OF EQUAL STATUS INTERCULTURAL COMMUNICATION
Published 2013-12-01Subjects: Get full text
Article -
862
Effect of self-healing of cracks in chloride ion diffusion and corrosion of engineered cementitious composites
Published 2025-03-01Subjects: Get full text
Article -
863
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01Subjects: “…scan-based side-channel attacks…”
Get full text
Article -
864
The Role of Atrial Fibrillation and Oral Anticoagulation Status in Health‐Related Quality of Life 12 Months After Ischemic Stroke or TIA
Published 2025-01-01Subjects: Get full text
Article -
865
Research on the multi-message modification techniques on MD5
Published 2009-01-01Subjects: Get full text
Article -
866
-
867
Random routing defense method based on deep deterministic policy gradient
Published 2021-06-01Subjects: Get full text
Article -
868
EBS-based efficient and secure group key management in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
869
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: Get full text
Article -
870
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01Subjects: Get full text
Article -
871
Analysis of provably secure on-demand source routing in MANET
Published 2009-01-01Subjects: Get full text
Article -
872
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01Subjects: Get full text
Article -
873
Rule-defect oriented browser XSS filter test method
Published 2018-11-01Subjects: “…cross-site scripting attack…”
Get full text
Article -
874
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: Get full text
Article -
875
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: Get full text
Article -
876
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01Subjects: Get full text
Article -
877
Qualification problems of war-related criminal offences documented on the de-occupied territories of Ukraine
Published 2022-09-01Subjects: Get full text
Article -
878
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01Subjects: “…side-channel attacks…”
Get full text
Article -
879
A Lightweight AI-Based Approach for Drone Jamming Detection
Published 2025-01-01Subjects: “…jamming attacks…”
Get full text
Article -
880
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article