-
301
Flow-induced Flutter Derivatives of Bridge Decks
Published 2025-02-01Subjects: Get full text
Article -
302
Software diversity evaluating method based on gadget feature analysis
Published 2023-06-01Subjects: Get full text
Article -
303
Fair secret sharing scheme using asymmetric bivariate polynomial
Published 2019-02-01Subjects: Get full text
Article -
304
Research on the game of information security investment based on the Gordon-Loeb model
Published 2018-02-01Subjects: Get full text
Article -
305
Overview of anomaly detection techniques for industrial Internet of things
Published 2022-03-01Subjects: Get full text
Article -
306
Survey of side channel attack on encrypted network traffic
Published 2021-08-01Subjects: Get full text
Article -
307
Improved meet-in-the-middle attack on ARIA cipher
Published 2015-03-01Subjects: Get full text
Article -
308
Geometry-covering based localization for Jamming attack in wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
309
-
310
Attacking scheme against the permutation-based multi-polynomial scheme for pair-wise key establishment in wireless sensor networks
Published 2015-08-01Subjects: Get full text
Article -
311
A dynamic trust evaluation scheme for cooperative spectrum sensing
Published 2016-03-01Subjects: Get full text
Article -
312
Evaluating Uncertainty Behaviors of Cognitive Users Against SSDF Attack for Cooperative Spectrum Sensing
Published 2015-02-01Subjects: Get full text
Article -
313
Security of the deployment of SDN-based IoT using blockchain
Published 2020-12-01Subjects: Get full text
Article -
314
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01Subjects: Get full text
Article -
315
Alert processing based on attack graph and multi-source analyzing
Published 2015-09-01Subjects: Get full text
Article -
316
Attack scenarios reasoning,hypothesizing and predicting based on capability transition model
Published 2007-01-01Subjects: Get full text
Article -
317
Research on sybil attack in defense blockchain based on improved PBFT algorithm
Published 2020-09-01Subjects: Get full text
Article -
318
Backdoor defense method in federated learning based on contrastive training
Published 2024-03-01Subjects: Get full text
Article -
319
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01Subjects: Get full text
Article -
320
Anti-ransomware method based on active deception
Published 2024-07-01Subjects: Get full text
Article