-
901
Pseudo 4D projective coordinate-based multi-base scalar multiplication
Published 2018-05-01Subjects: Get full text
Article -
902
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01Subjects: Get full text
Article -
903
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
904
Reputation computation based on new metric in P2P network
Published 2008-01-01Subjects: Get full text
Article -
905
Prior Anticoagulation and Risk of Hemorrhagic Transformation in Acute Stroke: A Post Hoc Analysis of the PRODAST Study
Published 2025-02-01Subjects: Get full text
Article -
906
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Published 2025-03-01Subjects: Get full text
Article -
907
Generation a shared secret using artificial neural networks
Published 2019-08-01Subjects: Get full text
Article -
908
Optimal strategy selection approach of moving target defense based on Markov time game
Published 2020-01-01Subjects: Get full text
Article -
909
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: Get full text
Article -
910
VMI-based virtual machine remote attestation scheme
Published 2018-12-01Subjects: Get full text
Article -
911
On the Adversarial Robustness of Decision Trees and a Symmetry Defense
Published 2025-01-01Subjects: “…Adversarial perturbation attacks…”
Get full text
Article -
912
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01Subjects: Get full text
Article -
913
App-DDoS detection method using partial binary tree based SVM algorithm
Published 2018-03-01Subjects: “…App-DDoS attack…”
Get full text
Article -
914
Enhancing the Strength and Durability Behaviour of Concrete Produced with Brown-Loamy Kaolin Clay Polymer
Published 2024-06-01Subjects: Get full text
Article -
915
Survey of software anomaly detection based on deception
Published 2022-02-01Subjects: Get full text
Article -
916
Fail-Safe Logic Design Strategies Within Modern FPGA Architectures
Published 2025-01-01Subjects: Get full text
Article -
917
Social risks of internet activity of virtual communities
Published 2023-10-01Subjects: Get full text
Article -
918
Optimizing Solid Oxide Fuel Cell Performance Using Advanced Meta-Heuristic Algorithms
Published 2024-06-01Subjects: Get full text
Article -
919
Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism
Published 2014-03-01Subjects: Get full text
Article -
920
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: Get full text
Article