-
221
Phishing attacks discovery based on HTML layout similarity
Published 2016-10-01Subjects: Get full text
Article -
222
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article -
223
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Published 2025-01-01Subjects: Get full text
Article -
224
Security analysis and improvement of two attribute-based signature schemes
Published 2016-10-01Subjects: Get full text
Article -
225
-
226
Novel defense based on softmax activation transformation
Published 2022-04-01Subjects: Get full text
Article -
227
-
228
3-subset meet-in-the-middle attack on block cipher TWIS
Published 2014-06-01Subjects: Get full text
Article -
229
Survey on model inversion attack and defense in federated learning
Published 2023-11-01Subjects: Get full text
Article -
230
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01Subjects: Get full text
Article -
231
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01Subjects: Get full text
Article -
232
Multi-point joint power analysis attack against AES
Published 2016-10-01Subjects: “…multi-point joint power analysis attack…”
Get full text
Article -
233
-
234
-
235
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: Get full text
Article -
236
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Subjects: Get full text
Article -
237
Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
Published 2008-01-01Subjects: Get full text
Article -
238
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: Get full text
Article -
239
Dynamic and heterogeneous Byzantine system in cloud
Published 2018-05-01Subjects: Get full text
Article -
240
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article