-
441
Causality adversarial attack generation algorithm for intelligent unmanned communication system
Published 2024-01-01Subjects: Get full text
Article -
442
A deep reinforcement learning-based approach for cyber resilient demand response optimization
Published 2025-01-01Subjects: Get full text
Article -
443
Russian business in the context of the growth of cybercrime: changes in economic behavior and protective mechanisms
Published 2024-09-01Subjects: Get full text
Article -
444
Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
Published 2023-03-01Subjects: Get full text
Article -
445
Learning-based DoS attack game strategy over multi-process systems
Published 2024-12-01Subjects: Get full text
Article -
446
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: Get full text
Article -
447
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
448
Lightweight searchable medical data sharing scheme
Published 2022-05-01Subjects: “…offline dictionary guessing attack…”
Get full text
Article -
449
Security-reliability tradeoff scheme for cognitive relay networks with eavesdropping attack over Nakagami-m fading channels
Published 2018-12-01Subjects: Get full text
Article -
450
Virtual Agents-Based Attack-Resilient Distributed Control for Islanded AC Microgrid
Published 2025-01-01Subjects: “…denial-of-service (DoS) attack…”
Get full text
Article -
451
Side channel leakage assessment with the Bartlett and multi-classes F-test
Published 2021-12-01Subjects: Get full text
Article -
452
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Published 2025-01-01Subjects: “…DDoS attack detection…”
Get full text
Article -
453
Observer-based event triggering security load frequency control for power systems involving air conditioning loads
Published 2024-11-01Subjects: Get full text
Article -
454
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01Subjects: Get full text
Article -
455
Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks
Published 2024-12-01Subjects: “…hash chain node capture attack…”
Get full text
Article -
456
Dynamic migration method of key virtual network function based on risk awareness
Published 2020-04-01Subjects: Get full text
Article -
457
The influence of blade profile shape of inlet guide vane on performance map of centrifugal compressor stage
Published 2020-12-01Subjects: Get full text
Article -
458
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
459
Host security threat analysis approach for network dynamic defense
Published 2018-04-01Subjects: Get full text
Article -
460
Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN
Published 2016-04-01Subjects: Get full text
Article