-
221
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: Get full text
Article -
222
Research on differential privacy protection parameter configuration method based on confidence level
Published 2019-08-01Subjects: “…probability inference attack model…”
Get full text
Article -
223
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01Subjects: Get full text
Article -
224
Survey of wireless sensor network security techniques
Published 2007-01-01Subjects: Get full text
Article -
225
Secure localization scheme against wormhole attack for wireless sensor networks
Published 2015-03-01Subjects: Get full text
Article -
226
Political rhetoric used by the main parties in the final debate before the 1999 election
Published 2022-10-01Subjects: Get full text
Article -
227
Related-key impossible differential attack on a lightweight block cipher MIBS
Published 2014-02-01Subjects: “…impossible differential attack…”
Get full text
Article -
228
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems
Published 2024-12-01Subjects: Get full text
Article -
229
Improvement of lightweight threshold group signature scheme
Published 2020-08-01Subjects: Get full text
Article -
230
Attack detection method based on spatiotemporal event correlation in intranet environment
Published 2020-01-01Subjects: Get full text
Article -
231
Escape method of malicious traffic based on backdoor attack
Published 2024-04-01Subjects: “…backdoor attack…”
Get full text
Article -
232
Defending Deep Neural Networks Against Backdoor Attack by Using De-Trigger Autoencoder
Published 2025-01-01Subjects: “…Backdoor attack…”
Get full text
Article -
233
Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization
Published 2025-01-01Subjects: “…adversarial patch attack…”
Get full text
Article -
234
A survey on DNS attack detection and security protection
Published 2022-09-01Subjects: Get full text
Article -
235
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01Subjects: Get full text
Article -
236
Moving target defense against network eavesdropping attack using POF
Published 2018-02-01Subjects: Get full text
Article -
237
Query recovery attacks against conjunctive keyword searchable encryption
Published 2024-08-01Subjects: Get full text
Article -
238
-
239
La place Jemaa el-Fna au « printemps marocain »
Published 2011-11-01Subjects: “…attack…”
Get full text
Article -
240
A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
Published 2024-01-01Subjects: Get full text
Article