-
281
Intellectualized forensic technique for Android pattern locks
Published 2022-02-01Subjects: Get full text
Article -
282
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01Subjects: Get full text
Article -
283
Measuring and analyzing node families in the Tor anonymous communication network
Published 2015-02-01Subjects: Get full text
Article -
284
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01Subjects: Get full text
Article -
285
Website defense strategy selection method based on attack-defense game and Monte Carlo simulation
Published 2018-08-01Subjects: “…attack-defense game…”
Get full text
Article -
286
Meet-in-the-middle attack on 11-round 3D cipher
Published 2015-08-01Subjects: Get full text
Article -
287
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Published 2024-12-01Subjects: “…cyber attacks…”
Get full text
Article -
288
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01Subjects: Get full text
Article -
289
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01Subjects: “…side-channel attack…”
Get full text
Article -
290
-
291
Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks
Published 2025-01-01Subjects: Get full text
Article -
292
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
Published 2011-01-01Subjects: Get full text
Article -
293
Research on active defense based on multi-stage cyber deception game
Published 2020-08-01Subjects: “…cyber attack and defense…”
Get full text
Article -
294
Effect of the difference enumeration attack on LowMC instances
Published 2021-06-01Subjects: “…difference enumeration attack…”
Get full text
Article -
295
Research on the SQL injection filtering based on SQL syntax tree
Published 2016-11-01Subjects: “…SQL injection attack…”
Get full text
Article -
296
Deep patch‐wise supervision for presentation attack detection
Published 2022-09-01Subjects: Get full text
Article -
297
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Subjects: Get full text
Article -
298
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01Subjects: Get full text
Article -
299
Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN
Published 2013-11-01Subjects: “…multi-step attack pattern…”
Get full text
Article -
300
New related-key rectangle attack on 42-round SHACAL-2
Published 2009-01-01Subjects: Get full text
Article