-
521
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Subjects: Get full text
Article -
522
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: Get full text
Article -
523
Computer Network Attacks and Modern International Law
Published 2014-04-01Subjects: Get full text
Article -
524
-
525
THREATS TO BUSINESS ACCOUNTING DATA IN THE DIGITAL AGE
Published 2024-12-01Subjects: Get full text
Article -
526
Difference between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-12-01Subjects: Get full text
Article -
527
A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
Published 2025-01-01Subjects: “…Cyber Attacks…”
Get full text
Article -
528
Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
529
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01Subjects: Get full text
Article -
530
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
531
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01Subjects: “…DoS attacks…”
Get full text
Article -
532
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01Subjects: “…control flow hijacking attacks…”
Get full text
Article -
533
Searchable public key encryption with designated verifier secure against the server
Published 2014-11-01Subjects: Get full text
Article -
534
Digital Health: The Cybersecurity for AI-Based Healthcare Communication
Published 2025-01-01Subjects: Get full text
Article -
535
-
536
Multibit image watermarking algorithm resistant to geometric attacks based on level set method
Published 2011-01-01Subjects: Get full text
Article -
537
Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game
Published 2025-01-01Subjects: Get full text
Article -
538
Reputation mechanism based on multi-path routing protocol in ad hoc networks
Published 2008-01-01Subjects: Get full text
Article -
539
Certificateless generalized signcryption scheme in the standard model
Published 2017-04-01Subjects: “…malicious-but-passive KGC attacks…”
Get full text
Article -
540
L’abdication du Congrès après le 11 septembre : crise constitutionnelle ou politique ?
Published 2011-09-01Subjects: Get full text
Article