-
241
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: Get full text
Article -
242
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01Subjects: Get full text
Article -
243
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01Subjects: Get full text
Article -
244
RSA-based image recognizable adversarial attack method
Published 2021-10-01Subjects: “…adversarial attack…”
Get full text
Article -
245
Application of keyword searchable encryption in cloud
Published 2015-11-01Subjects: Get full text
Article -
246
Chosen-key extracting attack to random LSB steganography
Published 2010-01-01Subjects: Get full text
Article -
247
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01Subjects: Get full text
Article -
248
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01Subjects: Get full text
Article -
249
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Subjects: “…quantum chosen plaintext attack…”
Get full text
Article -
250
-
251
Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers
Published 2024-01-01Subjects: Get full text
Article -
252
Secure deployment strategy of virtual machines based on operating system diversity
Published 2017-10-01Subjects: Get full text
Article -
253
AFault Tolerant Multi-Controller Framework for SDN DDoS Attacks Detection
Published 2022-01-01Subjects: Get full text
Article -
254
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01Subjects: Get full text
Article -
255
Research review of network defense decision-making methods based on attack and defense game
Published 2022-02-01Subjects: Get full text
Article -
256
Penetration test method using blind SQL injection based on second-order fragment and reassembly
Published 2017-10-01Subjects: Get full text
Article -
257
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Subjects: Get full text
Article -
258
SDN security prediction method based on bayesian attack graph
Published 2021-11-01Subjects: Get full text
Article -
259
Research on link detection technology based on dynamic browser fingerprint
Published 2022-08-01Subjects: Get full text
Article -
260
Game theory-based malware propagation model for wireless sensor network
Published 2018-11-01Subjects: Get full text
Article