-
261
Protocol to enhance the security of Early data in TLS 1.3
Published 2017-12-01Subjects: Get full text
Article -
262
Research on FAHP based Trojan attack effect evaluation
Published 2016-07-01Subjects: Get full text
Article -
263
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
264
New approach against Sybil attack in wireless sensor networks
Published 2008-01-01Subjects: Get full text
Article -
265
Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network
Published 2018-01-01Subjects: Get full text
Article -
266
-
267
Efficient attack detection and data aggregation algorithm
Published 2012-09-01Subjects: Get full text
Article -
268
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01Subjects: Get full text
Article -
269
Privacy protection system based on Hook for Android
Published 2018-04-01Subjects: Get full text
Article -
270
Multi-level loss object tracking adversarial attack method based on spatial perception
Published 2021-11-01Subjects: Get full text
Article -
271
Adversarial measurements for convolutional neural network-based energy theft detection model in smart grid
Published 2025-03-01Subjects: Get full text
Article -
272
Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
Published 2018-04-01Subjects: Get full text
Article -
273
Verifier-based password-authenticated key exchange protocol for three-party
Published 2008-01-01Subjects: Get full text
Article -
274
Legal and Ethical Considerations in the Use of Force against Civilian Aircraft
Published 2024-03-01Subjects: Get full text
Article -
275
Chandipura virus: The 2024 resurgence and Gujarat outbreak
Published 2024-12-01Subjects: Get full text
Article -
276
App-DDoS detection method based on K-means multiple principal component analysis
Published 2014-05-01Subjects: Get full text
Article -
277
Study of a new packet marking scheme for DDoS attack source traceback
Published 2005-01-01Subjects: Get full text
Article -
278
Multidimensional detection and dynamic defense method for link flooding attack
Published 2019-08-01Subjects: “…link flood attack…”
Get full text
Article -
279
DDoS attack detection and defense based on hybrid deep learning model in SDN
Published 2018-07-01Subjects: Get full text
Article -
280
Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection
Published 2006-01-01Subjects: Get full text
Article