-
581
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: Get full text
Article -
582
Securing Brain-to-Brain Communication Channels Using Adversarial Training on SSVEP EEG
Published 2025-01-01Subjects: Get full text
Article -
583
International study of the perceived stress and psychological impact of the 7 October attacks on Holocaust survivors
Published 2025-12-01Subjects: Get full text
Article -
584
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks
Published 2025-01-01Subjects: “…Man-in-the-middle (MitM) attacks…”
Get full text
Article -
585
-
586
Output Feedback-Based Fuzzy Event-Triggered Synchronization Control for Nonlinear Multiagent Systems Under DoS Attacks
Published 2025-01-01Subjects: Get full text
Article -
587
ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN
Published 2015-06-01Subjects: Get full text
Article -
588
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Published 2024-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
589
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: Get full text
Article -
590
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
591
-
592
Forest pest monitoring and early warning using UAV remote sensing and computer vision techniques
Published 2025-01-01Subjects: Get full text
Article -
593
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01Subjects: Get full text
Article -
594
Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay
Published 2025-02-01Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
Get full text
Article -
595
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
Get full text
Article -
596
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: Get full text
Article -
597
A systematic review of AI-enhanced techniques in credit card fraud detection
Published 2025-01-01Subjects: “…Fraud attacks…”
Get full text
Article -
598
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks
Published 2025-01-01Subjects: Get full text
Article -
599