-
361
Demand-Driven Resilient Control for Generation Unit of Local Power Plant Under Unreliable Communication
Published 2025-01-01Subjects: Get full text
Article -
362
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
363
Power analysis attack of dynamic password token based on SM3
Published 2017-03-01Subjects: Get full text
Article -
364
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
Published 2008-01-01Subjects: Get full text
Article -
365
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Subjects: Get full text
Article -
366
ID-based server-aided verification signature scheme with strong unforgeability
Published 2016-06-01Subjects: Get full text
Article -
367
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01Subjects: “…side-channel attack…”
Get full text
Article -
368
Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network
Published 2025-01-01Subjects: “…attack detection system…”
Get full text
Article -
369
Runtime verification approach for DoS attack detection in edge servers
Published 2021-09-01Subjects: Get full text
Article -
370
Parameter Identification and Control Method of a Hypersonic Wind Tunnel Attack Angle Mechanism
Published 2020-10-01Subjects: “…Attack angle mechanism…”
Get full text
Article -
371
-
372
Transferable Targeted Adversarial Attack on Synthetic Aperture Radar (SAR) Image Recognition
Published 2025-01-01Subjects: Get full text
Article -
373
Research on SSDF Attack and Defense for Cooperative Spectrum Sensing
Published 2014-01-01Subjects: “…spectrum sensing data falsification attack…”
Get full text
Article -
374
Research on filter-based adversarial feature selection against evasion attacks
Published 2023-07-01Subjects: Get full text
Article -
375
Minimum-cost network hardening algorithm based on stochastic loose optimize strategy
Published 2015-01-01Subjects: Get full text
Article -
376
Research of power preprocessing optimization-based template attack on LED
Published 2014-03-01Subjects: Get full text
Article -
377
PCA-based membership inference attack for machine learning models
Published 2022-01-01Subjects: Get full text
Article -
378
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01Subjects: “…russia, as, nato, cyber warfare, space technology hegemony, great power politics, cyber attack…”
Get full text
Article -
379
-
380
Survey of attack and detection based on the full life cycle of APT
Published 2024-09-01Subjects: Get full text
Article