-
201
Network security situation evaluation method for multi-step attack
Published 2017-01-01Subjects: Get full text
Article -
202
Multi-hop wireless network oriented multiple jammers localization algorithm
Published 2016-12-01Subjects: Get full text
Article -
203
Research on secure DPC localization algorithm of WSN
Published 2011-01-01Subjects: “…position attack…”
Get full text
Article -
204
Cellular automata model based power network attack prediction technology
Published 2023-04-01Subjects: Get full text
Article -
205
Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data
Published 2015-01-01Subjects: Get full text
Article -
206
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
207
Privacy leakage risk assessment for reversible neural network
Published 2023-08-01Subjects: Get full text
Article -
208
Geographical information based false report filtering scheme in wireless sensor networks
Published 2012-02-01Subjects: Get full text
Article -
209
Design of self-adaptive spatio-temporal diversity joint scheduling strategy
Published 2021-07-01Subjects: Get full text
Article -
210
-
211
Byzantine-robust federated learning over Non-IID data
Published 2023-06-01Subjects: Get full text
Article -
212
Design of a Flapping Aircraft with Variable Angles of Attack Based on a RC/RRU Parallel Mechanism
Published 2023-10-01Subjects: Get full text
Article -
213
Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
Published 2023-04-01Subjects: Get full text
Article -
214
Provable secure digital watermarking scheme
Published 2008-01-01Subjects: “…watermarking protocol attack…”
Get full text
Article -
215
LDoS attack detection method based on simple statistical features
Published 2022-11-01Subjects: Get full text
Article -
216
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01Subjects: Get full text
Article -
217
Distribution of Corrosion Attack in Chloride Exposed Concrete – Summary of Field Observations
Published 2024-12-01Subjects: Get full text
Article -
218
“Yeni Terörizm”in Geleceğin Güvenlik Ortamına Etkileri: Daeş Örneği
Published 2019-12-01Subjects: Get full text
Article -
219
Optimizing Stroke Detection Using Evidential Networks and Uncertainty-Based Refinement
Published 2025-01-01Subjects: Get full text
Article -
220
Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system
Published 2015-12-01Subjects: Get full text
Article