-
141
Shoulder-surfing resistant PIN-entry method
Published 2019-02-01Subjects: “…shoulder-surfing attack…”
Get full text
Article -
142
Damage modelling in concrete subject to sulfate attack
Published 2014-07-01Subjects: “…Sulfate attack; Concrete; Damage; Finite Element Method; Porous Media.…”
Get full text
Article -
143
Enhancing adversarial transferability with local transformation
Published 2024-11-01Subjects: Get full text
Article -
144
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01Subjects: Get full text
Article -
145
CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
Published 2023-04-01Subjects: Get full text
Article -
146
DDoS attack detection method based on conditional entropy and GHSOM in SDN
Published 2018-08-01Subjects: Get full text
Article -
147
Trojan message attack on the concatenated hash functions
Published 2016-08-01Subjects: Get full text
Article -
148
Measurement study on abnormal changes in authoritative resource records of government and educational domains
Published 2024-11-01Subjects: Get full text
Article -
149
Improved meet-in-the-middle attack on Joltik-BC-128
Published 2024-10-01Subjects: Get full text
Article -
150
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: “…cyber attack…”
Get full text
Article -
151
Verifiable three-party secure key exchange protocol based on eigenvalue
Published 2019-12-01Subjects: Get full text
Article -
152
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: Get full text
Article -
153
Research on attribute-based encryption with keyword search for cloud storage
Published 2017-11-01Subjects: Get full text
Article -
154
Cryptanalysis and improvement of several certificateless digital signature schemes
Published 2008-01-01Subjects: “…public key substitution attack…”
Get full text
Article -
155
Collusion node detection method based on fuzzy evaluation density clustering in Internet of vehicles
Published 2023-07-01Subjects: Get full text
Article -
156
Research on DDoS detection in multi-tenant cloud based on entropy change
Published 2016-10-01Subjects: “…DDoS attack…”
Get full text
Article -
157
Multi-step attack detection method based on network communication anomaly recognition
Published 2019-07-01Subjects: “…multi-step attack…”
Get full text
Article -
158
An Adversarial Attack via Penalty Method
Published 2025-01-01Subjects: “…Adversarial attack…”
Get full text
Article -
159
Coupled effects of chlorides and sulfates on steel reinforcement corrosion in concrete structures: A comprehensive review
Published 2025-07-01Subjects: Get full text
Article -
160
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
Published 2025-01-01Subjects: “…Attack trends…”
Get full text
Article