-
121
Clustering perception mining of network protocol’s stealth attack behavior
Published 2017-06-01Subjects: Get full text
Article -
122
Research on discovering multi-step attack patterns based on clustering IDS alert sequences
Published 2011-01-01Subjects: Get full text
Article -
123
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01Subjects: Get full text
Article -
124
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01Subjects: “…Backdoor attack…”
Get full text
Article -
125
A method for synthetic speech detection using local phase quantization
Published 2024-02-01Subjects: Get full text
Article -
126
Research on the risk adjacency matrix based on attack graphs
Published 2011-01-01Subjects: Get full text
Article -
127
Network slicing deployment method based on isolation level
Published 2020-04-01Subjects: Get full text
Article -
128
Approach to making strategies for network security enhancement based on attack graphs
Published 2009-01-01Subjects: Get full text
Article -
129
Post-harvest Fungal Infection in Arabica Coffee Beans (Coffea arabica Linnaeus) in the Coffee Center of West Sumatra Province, Indonesia
Published 2022-12-01Subjects: “…Attack, Aspergillus niger, Aspergillus flavus, Aspergillus ochraceus, storage…”
Get full text
Article -
130
Attacks on Telex Internet anticensorship system
Published 2014-09-01Subjects: Get full text
Article -
131
-
132
Lysosome-related proteins may have changes in the urinary exosomes of patients with acute gout attack
Published 2025-01-01Subjects: “…Acute gout attack…”
Get full text
Article -
133
Efficient group signature scheme with revocation
Published 2016-10-01Subjects: Get full text
Article -
134
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01Subjects: Get full text
Article -
135
Model of coorperation defense DDoS attack based on client reputation
Published 2009-01-01Subjects: “…DDoS attack…”
Get full text
Article -
136
Research on tracking DDoS based on NTP reflection amplification attack
Published 2014-10-01Subjects: “…reflection amplification attack…”
Get full text
Article -
137
Lvov and Sandomir Offensive Operation: the Look 70 Years
Published 2015-02-01Subjects: Get full text
Article -
138
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01Subjects: Get full text
Article -
139
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: Get full text
Article -
140
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article