-
281
Verifiable three-party secure key exchange protocol based on eigenvalue
Published 2019-12-01Subjects: Get full text
Article -
282
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: Get full text
Article -
283
Research on attribute-based encryption with keyword search for cloud storage
Published 2017-11-01Subjects: Get full text
Article -
284
Cryptanalysis and improvement of several certificateless digital signature schemes
Published 2008-01-01Subjects: “…public key substitution attack…”
Get full text
Article -
285
Collusion node detection method based on fuzzy evaluation density clustering in Internet of vehicles
Published 2023-07-01Subjects: Get full text
Article -
286
Research on DDoS detection in multi-tenant cloud based on entropy change
Published 2016-10-01Subjects: “…DDoS attack…”
Get full text
Article -
287
Multi-step attack detection method based on network communication anomaly recognition
Published 2019-07-01Subjects: “…multi-step attack…”
Get full text
Article -
288
An Adversarial Attack via Penalty Method
Published 2025-01-01Subjects: “…Adversarial attack…”
Get full text
Article -
289
Coupled effects of chlorides and sulfates on steel reinforcement corrosion in concrete structures: A comprehensive review
Published 2025-07-01Subjects: Get full text
Article -
290
Leveraging Social Networks for Cyber Threat Intelligence: Analyzing Attack Trends and TTPs in the Arab World
Published 2025-01-01Subjects: “…Attack trends…”
Get full text
Article -
291
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
Published 2021-04-01Subjects: “…SQL injection attack…”
Get full text
Article -
292
Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation
Published 2023-11-01Subjects: Get full text
Article -
293
Privacy level evaluation of differential privacy for time series based on filtering theory
Published 2017-05-01Subjects: Get full text
Article -
294
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
295
Double adversarial attack against license plate recognition system
Published 2023-06-01Subjects: Get full text
Article -
296
Adversarial Drift Detection in Intrusion Detection System
Published 2015-03-01Subjects: Get full text
Article -
297
Survey on trust evaluation mechanism in sensor-cloud
Published 2018-06-01Subjects: Get full text
Article -
298
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01Subjects: Get full text
Article -
299
Improved Cache trace driven attack on AES and CLEFIA
Published 2011-01-01Subjects: Get full text
Article -
300
Software diversification method based on binary rewriting
Published 2023-04-01Subjects: Get full text
Article