-
941
The influence of blade profile shape of inlet guide vane on performance map of centrifugal compressor stage
Published 2020-12-01Subjects: Get full text
Article -
942
Host security threat analysis approach for network dynamic defense
Published 2018-04-01Subjects: Get full text
Article -
943
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: Get full text
Article -
944
Feature extraction of side channel signal based on EMD and difference spectrum of singular value
Published 2016-07-01Subjects: Get full text
Article -
945
Forest pest monitoring and early warning using UAV remote sensing and computer vision techniques
Published 2025-01-01Subjects: Get full text
Article -
946
-
947
Partially policy hidden CP-ABE supporting dynamic policy updating
Published 2015-12-01Subjects: “…adaptive chosen plaintext attack secure…”
Get full text
Article -
948
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01Subjects: Get full text
Article -
949
THE FEATURES OF STATISTICAL CHARACTERISTICS TERRORISM ON TRANSPORT
Published 2018-02-01Subjects: Get full text
Article -
950
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01Subjects: Get full text
Article -
951
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
Get full text
Article -
952
Exploring the Roles of In-Network Caching in ICN
Published 2014-03-01Subjects: Get full text
Article -
953
A Trajectory Prediction Method for Reentry Glide Vehicles via Adaptive Cost Function
Published 2025-01-01Subjects: Get full text
Article -
954
A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones
Published 2025-01-01Subjects: Get full text
Article -
955
Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Published 2025-02-01Subjects: Get full text
Article -
956
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: Get full text
Article -
957
A systematic review of AI-enhanced techniques in credit card fraud detection
Published 2025-01-01Subjects: “…Fraud attacks…”
Get full text
Article -
958
CANGuard: An Enhanced Approach to the Detection of Anomalies in CAN-Enabled Vehicles
Published 2025-01-01Subjects: Get full text
Article -
959
-
960
Negative feedback scheduling algorithm based on historical information in SDN
Published 2018-06-01“…In the current SDN architecture,the controllers suffer from lots of potential attacks.For example,malicious flow rule attacks may introduce fake flow rules to confuse the host.A negative feedback scheduling algorithm based on historical information was proposed,in which hypothesis testing was used to judge the behavior of the attacker and the result will be used as a basis for scheduling.Simulation results and analysis show that,compared with the traditional scheduling methods,the proposed algorithm can increase the attacker’s time cost to a certain extent,so as to effectively defend the attacker’s probe attack.In addition,the more types of controllers,the more difficult it is to break the system.…”
Get full text
Article