-
541
Quantized <italic>l</italic>₂-<italic>l</italic>∞ Control for Nonlinear Discrete-Time Systems With DoS Attacks
Published 2025-01-01Subjects: “…DoS attacks…”
Get full text
Article -
542
Effects on lifetime of opportunistic network based on Epidemic routing under flooding attacks
Published 2012-09-01Subjects: Get full text
Article -
543
CANGuard: An Enhanced Approach to the Detection of Anomalies in CAN-Enabled Vehicles
Published 2025-01-01Subjects: Get full text
Article -
544
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Subjects: “…DDoS attacks…”
Get full text
Article -
545
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
546
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
547
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
Published 2013-10-01Subjects: Get full text
Article -
548
Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender Systems
Published 2019-01-01Subjects: Get full text
Article -
549
Privacy Auditing in Differential Private Machine Learning: The Current Trends
Published 2025-01-01Subjects: Get full text
Article -
550
Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems
Published 2025-01-01Subjects: Get full text
Article -
551
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01Subjects: Get full text
Article -
552
Robust deployment strategy for security data collection agent
Published 2019-06-01Subjects: Get full text
Article -
553
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01Subjects: “…scan-based side-channel attacks…”
Get full text
Article -
554
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01Subjects: “…side-channel attacks…”
Get full text
Article -
555
A Lightweight AI-Based Approach for Drone Jamming Detection
Published 2025-01-01Subjects: “…jamming attacks…”
Get full text
Article -
556
-
557
GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY
Published 2013-08-01Subjects: Get full text
Article -
558
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
559
Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments
Published 2024-12-01Subjects: Get full text
Article -
560
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01Subjects: Get full text
Article