-
881
Review on security risks of key components in industrial control system
Published 2022-06-01Subjects: Get full text
Article -
882
Demand-Driven Resilient Control for Generation Unit of Local Power Plant Under Unreliable Communication
Published 2025-01-01Subjects: Get full text
Article -
883
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
884
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
Published 2008-01-01Subjects: Get full text
Article -
885
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Subjects: Get full text
Article -
886
ID-based server-aided verification signature scheme with strong unforgeability
Published 2016-06-01Subjects: Get full text
Article -
887
-
888
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01Subjects: “…side-channel attack…”
Get full text
Article -
889
GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY
Published 2013-08-01Subjects: Get full text
Article -
890
Minimum-cost network hardening algorithm based on stochastic loose optimize strategy
Published 2015-01-01Subjects: Get full text
Article -
891
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01Subjects: “…russia, as, nato, cyber warfare, space technology hegemony, great power politics, cyber attack…”
Get full text
Article -
892
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
893
Defense decision-making method based on incomplete information stochastic game and Q-learning
Published 2018-08-01Subjects: “…network attack and defense…”
Get full text
Article -
894
Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments
Published 2024-12-01Subjects: Get full text
Article -
895
Defense decision-making method based on incomplete information stochastic game
Published 2018-08-01Subjects: “…network attack-defense…”
Get full text
Article -
896
Digital watermarking algorithm in SWT domain based on robust local feature
Published 2019-11-01Subjects: Get full text
Article -
897
Enhanced method based on virtual registers rotation
Published 2018-05-01Subjects: Get full text
Article -
898
Variable threshold energy detection algorithm based on trust degree
Published 2018-08-01Subjects: “…probabilistic spectrum sensing data falsification attack…”
Get full text
Article -
899
Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI
Published 2025-01-01Subjects: Get full text
Article -
900
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: Get full text
Article