-
261
Attacks on Telex Internet anticensorship system
Published 2014-09-01Subjects: Get full text
Article -
262
-
263
Lysosome-related proteins may have changes in the urinary exosomes of patients with acute gout attack
Published 2025-01-01Subjects: “…Acute gout attack…”
Get full text
Article -
264
Efficient group signature scheme with revocation
Published 2016-10-01Subjects: Get full text
Article -
265
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01Subjects: Get full text
Article -
266
Model of coorperation defense DDoS attack based on client reputation
Published 2009-01-01Subjects: “…DDoS attack…”
Get full text
Article -
267
Research on tracking DDoS based on NTP reflection amplification attack
Published 2014-10-01Subjects: “…reflection amplification attack…”
Get full text
Article -
268
Lvov and Sandomir Offensive Operation: the Look 70 Years
Published 2015-02-01Subjects: Get full text
Article -
269
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01Subjects: Get full text
Article -
270
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: Get full text
Article -
271
Shoulder-surfing resistant PIN-entry method
Published 2019-02-01Subjects: “…shoulder-surfing attack…”
Get full text
Article -
272
Damage modelling in concrete subject to sulfate attack
Published 2014-07-01Subjects: “…Sulfate attack; Concrete; Damage; Finite Element Method; Porous Media.…”
Get full text
Article -
273
Enhancing adversarial transferability with local transformation
Published 2024-11-01Subjects: Get full text
Article -
274
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01Subjects: Get full text
Article -
275
CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
Published 2023-04-01Subjects: Get full text
Article -
276
DDoS attack detection method based on conditional entropy and GHSOM in SDN
Published 2018-08-01Subjects: Get full text
Article -
277
Trojan message attack on the concatenated hash functions
Published 2016-08-01Subjects: Get full text
Article -
278
Measurement study on abnormal changes in authoritative resource records of government and educational domains
Published 2024-11-01Subjects: Get full text
Article -
279
Improved meet-in-the-middle attack on Joltik-BC-128
Published 2024-10-01Subjects: Get full text
Article -
280
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: “…cyber attack…”
Get full text
Article