-
501
-
502
You Only Attack Once: Single-Step DeepFool Algorithm
Published 2024-12-01Subjects: Get full text
Article -
503
Analysis and improvement of a password-based authenticated key exchange protocol
Published 2010-01-01Subjects: Get full text
Article -
504
Le son dans les procès filmés en France
Published 2024-10-01Subjects: “…trials of the terrorist attacks…”
Get full text
Article -
505
Class of constructions of even variables Boolean function with optimum algebraic immunity
Published 2009-01-01Subjects: Get full text
Article -
506
Adversarial Robust Modulation Recognition Guided by Attention Mechanisms
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
507
A single flow detection enabled method for DDoS attacks in IoT based on traffic feature reconstruction and mapping
Published 2024-01-01Subjects: “…DDoS attacks detection…”
Get full text
Article -
508
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Published 2022-09-01Subjects: Get full text
Article -
509
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: “…denial of service attacks…”
Get full text
Article -
510
Clinical presentation and impact of internal carotid artery kinking in children
Published 2024-12-01Subjects: Get full text
Article -
511
Improving the information security sustainability of the economy financial sector
Published 2023-06-01Subjects: Get full text
Article -
512
Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models
Published 2025-01-01Subjects: “…adversarial attacks…”
Get full text
Article -
513
Intolerance, Religious Lynchings and the Future of Indonesia
Published 2011-02-01Subjects: Get full text
Article -
514
Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review
Published 2025-02-01Subjects: Get full text
Article -
515
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
516
Trust Management in Social Internet of Things (SIoT): A Survey
Published 2022-01-01Subjects: Get full text
Article -
517
Adversarial attacks and defenses in deep learning
Published 2020-10-01Subjects: Get full text
Article -
518
DDoS defense with IP traceback and path identification
Published 2011-01-01Subjects: Get full text
Article -
519
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01Subjects: Get full text
Article -
520
Survey on Low Energy Adaptive Clustering Hierarchical Protocol
Published 2022-09-01Subjects: Get full text
Article