-
141
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
142
Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments
Published 2024-12-01Subjects: Get full text
Article -
143
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01Subjects: Get full text
Article -
144
Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI
Published 2025-01-01Subjects: Get full text
Article -
145
Neural networks-based event-triggered consensus control for nonlinear multiagent systems with communication link faults and DoS attacks
Published 2024-06-01Subjects: Get full text
Article -
146
-
147
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Published 2025-03-01Subjects: Get full text
Article -
148
On the Adversarial Robustness of Decision Trees and a Symmetry Defense
Published 2025-01-01Subjects: “…Adversarial perturbation attacks…”
Get full text
Article -
149
Experimental assessment of аdversarial attacks to the deep neural networks in medical image recognition
Published 2019-09-01Subjects: “…adversarial attacks…”
Get full text
Article -
150
Social risks of internet activity of virtual communities
Published 2023-10-01Subjects: Get full text
Article -
151
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
152
Graph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability
Published 2025-01-01Subjects: Get full text
Article -
153
Online and Offline Identification of False Data Injection Attacks in Battery Sensors Using a Single Particle Model
Published 2024-01-01Subjects: Get full text
Article -
154
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: Get full text
Article -
155
Securing Brain-to-Brain Communication Channels Using Adversarial Training on SSVEP EEG
Published 2025-01-01Subjects: Get full text
Article -
156
International study of the perceived stress and psychological impact of the 7 October attacks on Holocaust survivors
Published 2025-12-01Subjects: Get full text
Article -
157
Output Feedback-Based Fuzzy Event-Triggered Synchronization Control for Nonlinear Multiagent Systems Under DoS Attacks
Published 2025-01-01Subjects: Get full text
Article -
158
Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay
Published 2025-02-01Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
Get full text
Article -
159
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
Get full text
Article -
160
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: Get full text
Article