-
81
Kiai sebagai Konselor: Pendekatan Spiritual dalam Mereduksi Panic Attack Santri di Pesantren
Published 2024-12-01Subjects: Get full text
Article -
82
The Impact of Suicide Attacks on Voting Behavior: The Case of November 2015 Early Elections
Published 2018-10-01Subjects: Get full text
Article -
83
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01Subjects: Get full text
Article -
84
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01Subjects: Get full text
Article -
85
Differential fault analysis on EMV application cryptogram
Published 2016-04-01Subjects: Get full text
Article -
86
A FUZZY LOGIC MODEL FOR HUMAN DISTRESS DETECTION
Published 2024-01-01Subjects: “…distress detection, fuzzy logic, parameters, physical attack…”
Get full text
Article -
87
The effects of war-related experiences on mental health symptoms of individuals living in conflict zones: a longitudinal study
Published 2025-01-01Subjects: Get full text
Article -
88
Survey on application of attack graph technology
Published 2017-11-01Subjects: “…attack graph…”
Get full text
Article -
89
Mobile detection of replication attacks in wireless sensor network
Published 2012-09-01Subjects: Get full text
Article -
90
A Network Traffic Classification Method for Class-Imbalanced Data
Published 2015-06-01Subjects: “…attack traffic…”
Get full text
Article -
91
Phishing attacks discovery based on HTML layout similarity
Published 2016-10-01Subjects: Get full text
Article -
92
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article -
93
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Published 2025-01-01Subjects: Get full text
Article -
94
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
95
-
96
Novel defense based on softmax activation transformation
Published 2022-04-01Subjects: Get full text
Article -
97
-
98
3-subset meet-in-the-middle attack on block cipher TWIS
Published 2014-06-01Subjects: Get full text
Article -
99
Survey on model inversion attack and defense in federated learning
Published 2023-11-01Subjects: Get full text
Article -
100
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01Subjects: Get full text
Article