-
161
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
Published 2021-04-01Subjects: “…SQL injection attack…”
Get full text
Article -
162
Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation
Published 2023-11-01Subjects: Get full text
Article -
163
Privacy level evaluation of differential privacy for time series based on filtering theory
Published 2017-05-01Subjects: Get full text
Article -
164
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
165
Double adversarial attack against license plate recognition system
Published 2023-06-01Subjects: Get full text
Article -
166
Adversarial Drift Detection in Intrusion Detection System
Published 2015-03-01Subjects: Get full text
Article -
167
Survey on trust evaluation mechanism in sensor-cloud
Published 2018-06-01Subjects: Get full text
Article -
168
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01Subjects: Get full text
Article -
169
Improved Cache trace driven attack on AES and CLEFIA
Published 2011-01-01Subjects: Get full text
Article -
170
Software diversification method based on binary rewriting
Published 2023-04-01Subjects: Get full text
Article -
171
Flow-induced Flutter Derivatives of Bridge Decks
Published 2025-02-01Subjects: Get full text
Article -
172
Software diversity evaluating method based on gadget feature analysis
Published 2023-06-01Subjects: Get full text
Article -
173
Fair secret sharing scheme using asymmetric bivariate polynomial
Published 2019-02-01Subjects: Get full text
Article -
174
Research on the game of information security investment based on the Gordon-Loeb model
Published 2018-02-01Subjects: Get full text
Article -
175
Overview of anomaly detection techniques for industrial Internet of things
Published 2022-03-01Subjects: Get full text
Article -
176
Survey of side channel attack on encrypted network traffic
Published 2021-08-01Subjects: Get full text
Article -
177
Improved meet-in-the-middle attack on ARIA cipher
Published 2015-03-01Subjects: Get full text
Article -
178
Geometry-covering based localization for Jamming attack in wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
179
-
180
Attacking scheme against the permutation-based multi-polynomial scheme for pair-wise key establishment in wireless sensor networks
Published 2015-08-01Subjects: Get full text
Article