-
81
Preparing a Family Communication Plan for Terrorist Attacks
Published 2003-06-01Get full text
Article -
82
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01Subjects: “…difference enumeration attack…”
Get full text
Article -
83
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: “…denial of service attacks…”
Get full text
Article -
84
Improved meet-in-the-middle attack on Joltik-BC-128
Published 2024-10-01Subjects: Get full text
Article -
85
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01Subjects: Get full text
Article -
86
Simple power analysis attack on random pseudo operations
Published 2012-05-01Subjects: Get full text
Article -
87
Shoulder Pain, Paralysis and Fever: Dog Attack or Infection?
Published 2003-01-01Get full text
Article -
88
Deep patch‐wise supervision for presentation attack detection
Published 2022-09-01Subjects: Get full text
Article -
89
Friend-Guard Textfooler Attack on Text Classification System
Published 2025-01-01Subjects: Get full text
Article -
90
Preparing a Family Communication Plan for Terrorist Attacks
Published 2003-06-01Get full text
Article -
91
Attack simulation and signature extraction of low-rate DDoS
Published 2008-01-01“…Experiments show that LDDoS attack traffic exhibit strong periodicity. Based on the periodical feature of LDDoS attack, the signatures of LDDoS attack are extracted through analyzing the cache queue of target router for the purpose of detection and defense of LDDoS attack. …”
Get full text
Article -
92
Deception defense method against intelligent penetration attack
Published 2022-10-01Subjects: Get full text
Article -
93
Label flipping adversarial attack on graph neural network
Published 2021-09-01Subjects: Get full text
Article -
94
Zero correlation-integral attack of MIBS block cipher
Published 2016-11-01“…Finally, considering the symmetrical structure of the MIBS and using the partial-sum technique, it applied integral attack to 10 and 12 rounds of MIBS-80. The time com-plexities of 10 and 12 round attack on MIBS-80 are 2<sup>27.68</sup>and 2<sup>48.81</sup>. …”
Get full text
Article -
95
Escape method of malicious traffic based on backdoor attack
Published 2024-04-01Subjects: “…backdoor attack…”
Get full text
Article -
96
A survey on DNS attack detection and security protection
Published 2022-09-01Subjects: Get full text
Article -
97
A novel perturbation attack on SVM by greedy algorithm
Published 2019-01-01“…With the increasing concern of machine learning security issues, an adversarial sample generation method for SVM was proposed. This attack occurred in the testing stage by manipulating with the sample tofool the SVM classification model. …”
Get full text
Article -
98
Research on SSDF Attack and Defense for Cooperative Spectrum Sensing
Published 2014-01-01Subjects: “…spectrum sensing data falsification attack…”
Get full text
Article -
99
Mobile detection of replication attacks in wireless sensor network
Published 2012-09-01Subjects: Get full text
Article -
100
Research on HTML5 application cache poison attack
Published 2016-10-01Subjects: Get full text
Article