-
1
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Published 2024-11-01Subjects: Get full text
Article -
2
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01Subjects: Get full text
Article -
3
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: “…attack prediction;security situation;Bayesian attack graph;attack-defense;time prediction…”
Get full text
Article -
4
Enhancing SAR-ATR Systems’ Resistance to S2M Attacks via FUA: Optimizing Surrogate Models for Adversarial Example Transferability
Published 2025-01-01Subjects: “…Adversarial attack…”
Get full text
Article -
5
Light Attack: A Physical World Real-Time Attack Against Object Classifiers
Published 2025-01-01Subjects: Get full text
Article -
6
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: “…attack prediction…”
Get full text
Article -
7
Resilient Multimedia Embedding in DICOM Images: A Robustness Evaluation Under Multiple Attacks
Published 2025-01-01Subjects: Get full text
Article -
8
Time synchronization attack detection for industrial wireless network
Published 2023-06-01Subjects: Get full text
Article -
9
Time synchronization attack detection for industrial wireless network
Published 2023-06-01Subjects: “…industrial wireless network;time synchronization attack;delay attack;attack detection;Bayesian model…”
Get full text
Article -
10
Damage modelling in concrete subject to sulfate attack
Published 2014-07-01Subjects: “…Sulfate attack…”
Get full text
Article -
11
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution
Published 2023-01-01Subjects: Get full text
Article -
12
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01Subjects: Get full text
Article -
13
Timing and Speculative Execution Attacks: Defeating State-of-the-Art Code-Reuse Defenses
Published 2025-01-01Subjects: “…Code-reuse attack…”
Get full text
Article -
14
Blind mask template attacks on masked cryptographic algorithm
Published 2019-01-01Subjects: “…side channel attack…”
Get full text
Article -
15
Stealthy Vehicle Adversarial Camouflage Texture Generation Based on Neural Style Transfer
Published 2024-10-01Subjects: “…physical attack…”
Get full text
Article -
16
Template attack of Crypto chip based on clustering
Published 2018-08-01Subjects: “…side channel attack…”
Get full text
Article -
17
Compressive Strength of Recycled Green Concrete Affected by Chloride and Sulfate Exposures
Published 2024-11-01Subjects: Get full text
Article -
18
Preimage and collision attacks on reduced Ascon using algebraic strategies
Published 2025-05-01Subjects: Get full text
Article -
19
Dual-branch autoencoder network for attacking deep hashing image retrieval models
Published 2023-11-01Subjects: “…targeted attack…”
Get full text
Article -
20
Gyro-Mag: Attack-Resilient System Based on Sensor Estimation
Published 2025-03-01Subjects: Get full text
Article