-
181
A dynamic trust evaluation scheme for cooperative spectrum sensing
Published 2016-03-01Subjects: Get full text
Article -
182
Evaluating Uncertainty Behaviors of Cognitive Users Against SSDF Attack for Cooperative Spectrum Sensing
Published 2015-02-01Subjects: Get full text
Article -
183
Security of the deployment of SDN-based IoT using blockchain
Published 2020-12-01Subjects: Get full text
Article -
184
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01Subjects: Get full text
Article -
185
Alert processing based on attack graph and multi-source analyzing
Published 2015-09-01Subjects: Get full text
Article -
186
Attack scenarios reasoning,hypothesizing and predicting based on capability transition model
Published 2007-01-01Subjects: Get full text
Article -
187
Research on sybil attack in defense blockchain based on improved PBFT algorithm
Published 2020-09-01Subjects: Get full text
Article -
188
Backdoor defense method in federated learning based on contrastive training
Published 2024-03-01Subjects: Get full text
Article -
189
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01Subjects: Get full text
Article -
190
Anti-ransomware method based on active deception
Published 2024-07-01Subjects: Get full text
Article -
191
Adaptive secure network coding scheme against pollution attacks
Published 2013-11-01Subjects: Get full text
Article -
192
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01Subjects: Get full text
Article -
193
Key-controlled Rijndael algorithm with multiple S-boxes
Published 2007-01-01Subjects: Get full text
Article -
194
Location privacy protection for mobile social network
Published 2015-12-01Subjects: Get full text
Article -
195
Blockchain-driven distributed consensus mechanism in defensing Byzantine attack for the Internet of spectrum device
Published 2020-03-01Subjects: Get full text
Article -
196
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01Subjects: Get full text
Article -
197
UDM:NFV-based prevention mechanism against DDoS attack on SDN controller
Published 2019-03-01Subjects: “…DDoS attack…”
Get full text
Article -
198
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
199
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: “…Attack detection…”
Get full text
Article -
200
The effect of the Ayas model to learning individual fast attack and high-order thinking skills of handball for students
Published 2025-01-01Subjects: Get full text
Article