-
61
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
62
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Subjects: Get full text
Article -
63
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01Subjects: “…russia, as, nato, cyber warfare, space technology hegemony, great power politics, cyber attack…”
Get full text
Article -
64
-
65
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
66
A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm
Published 2025-01-01Subjects: “…Acoustic side channel attack…”
Get full text
Article -
67
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01Subjects: “…False data injection attack…”
Get full text
Article -
68
Prior Anticoagulation and Risk of Hemorrhagic Transformation in Acute Stroke: A Post Hoc Analysis of the PRODAST Study
Published 2025-02-01Subjects: Get full text
Article -
69
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01Subjects: Get full text
Article -
70
Generation a shared secret using artificial neural networks
Published 2019-08-01Subjects: Get full text
Article -
71
Association of Slender Patent Ductus Arteriosus Combined With PFO Related to the Transient Ischemic Attack: A Rare Case Report
Published 2025-01-01Subjects: Get full text
Article -
72
-
73
Enhancing the Strength and Durability Behaviour of Concrete Produced with Brown-Loamy Kaolin Clay Polymer
Published 2024-06-01Subjects: Get full text
Article -
74
RUSSIA'S STRATEGIC DETERRENCE AND DEFENSE AGAINST POTENTIAL MEANS AND METHODS OF STRATEGIC ATTACK
Published 2019-01-01Subjects: “…strategic attack…”
Get full text
Article -
75
Optimizing Solid Oxide Fuel Cell Performance Using Advanced Meta-Heuristic Algorithms
Published 2024-06-01Subjects: Get full text
Article -
76
Vegetative status in patients with transient ischemic attack and stroke
Published 2018-06-01Subjects: “…transient ischemic attack…”
Get full text
Article -
77
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
78
APDL: an adaptive step size method for white-box adversarial attacks
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
79
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
80
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article