-
201
-
202
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Subjects: Get full text
Article -
203
Big Data Application in Network Security Analysis
Published 2015-07-01Subjects: Get full text
Article -
204
-
205
Application of security analysis technology for network big data
Published 2017-03-01Subjects: Get full text
Article -
206
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: Get full text
Article -
207
Effect of carbonation curing and sodium content on geopolymer subjected to sodium and magnesium sulfate attack
Published 2025-01-01Subjects: “…sulfate attack…”
Get full text
Article -
208
Simple power analysis attack on random pseudo operations
Published 2012-05-01Subjects: Get full text
Article -
209
Comparison of selected physical fitness components among male football players of different playing positions
Published 2015-11-01Subjects: “…agility; attackers; defenders; goalkeepers; midfielders; power; speed…”
Get full text
Article -
210
-
211
Kiai sebagai Konselor: Pendekatan Spiritual dalam Mereduksi Panic Attack Santri di Pesantren
Published 2024-12-01Subjects: Get full text
Article -
212
The Impact of Suicide Attacks on Voting Behavior: The Case of November 2015 Early Elections
Published 2018-10-01Subjects: Get full text
Article -
213
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01Subjects: Get full text
Article -
214
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01Subjects: Get full text
Article -
215
Differential fault analysis on EMV application cryptogram
Published 2016-04-01Subjects: Get full text
Article -
216
A FUZZY LOGIC MODEL FOR HUMAN DISTRESS DETECTION
Published 2024-01-01Subjects: “…distress detection, fuzzy logic, parameters, physical attack…”
Get full text
Article -
217
The effects of war-related experiences on mental health symptoms of individuals living in conflict zones: a longitudinal study
Published 2025-01-01Subjects: Get full text
Article -
218
Survey on application of attack graph technology
Published 2017-11-01Subjects: “…attack graph…”
Get full text
Article -
219
Mobile detection of replication attacks in wireless sensor network
Published 2012-09-01Subjects: Get full text
Article -
220
A Network Traffic Classification Method for Class-Imbalanced Data
Published 2015-06-01Subjects: “…attack traffic…”
Get full text
Article