-
121
Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review
Published 2025-02-01Subjects: Get full text
Article -
122
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
123
Survey on Low Energy Adaptive Clustering Hierarchical Protocol
Published 2022-09-01Subjects: Get full text
Article -
124
Difference between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-12-01Subjects: Get full text
Article -
125
Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
126
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01Subjects: Get full text
Article -
127
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
128
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01Subjects: “…DoS attacks…”
Get full text
Article -
129
-
130
Quantized <italic>l</italic>₂-<italic>l</italic>∞ Control for Nonlinear Discrete-Time Systems With DoS Attacks
Published 2025-01-01Subjects: “…DoS attacks…”
Get full text
Article -
131
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Subjects: “…DDoS attacks…”
Get full text
Article -
132
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
133
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
134
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
Published 2013-10-01Subjects: Get full text
Article -
135
Privacy Auditing in Differential Private Machine Learning: The Current Trends
Published 2025-01-01Subjects: Get full text
Article -
136
Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems
Published 2025-01-01Subjects: Get full text
Article -
137
Statistical-based detection of pilot contamination attack for NOMA in 5G networks
Published 2025-01-01Subjects: Get full text
Article -
138
A Lightweight AI-Based Approach for Drone Jamming Detection
Published 2025-01-01Subjects: “…jamming attacks…”
Get full text
Article -
139
-
140
GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY
Published 2013-08-01Subjects: Get full text
Article