-
321
Adaptive secure network coding scheme against pollution attacks
Published 2013-11-01Subjects: Get full text
Article -
322
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01Subjects: Get full text
Article -
323
Key-controlled Rijndael algorithm with multiple S-boxes
Published 2007-01-01Subjects: Get full text
Article -
324
Location privacy protection for mobile social network
Published 2015-12-01Subjects: Get full text
Article -
325
Blockchain-driven distributed consensus mechanism in defensing Byzantine attack for the Internet of spectrum device
Published 2020-03-01Subjects: Get full text
Article -
326
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01Subjects: Get full text
Article -
327
UDM:NFV-based prevention mechanism against DDoS attack on SDN controller
Published 2019-03-01Subjects: “…DDoS attack…”
Get full text
Article -
328
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
329
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: “…Attack detection…”
Get full text
Article -
330
The effect of the Ayas model to learning individual fast attack and high-order thinking skills of handball for students
Published 2025-01-01Subjects: Get full text
Article -
331
Network security situation evaluation method for multi-step attack
Published 2017-01-01Subjects: Get full text
Article -
332
Multi-hop wireless network oriented multiple jammers localization algorithm
Published 2016-12-01Subjects: Get full text
Article -
333
Research on secure DPC localization algorithm of WSN
Published 2011-01-01Subjects: “…position attack…”
Get full text
Article -
334
Cellular automata model based power network attack prediction technology
Published 2023-04-01Subjects: Get full text
Article -
335
Chosen-plaintext power analysis attack against SMS4 with the round-output as the intermediate data
Published 2015-01-01Subjects: Get full text
Article -
336
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
337
Privacy leakage risk assessment for reversible neural network
Published 2023-08-01Subjects: Get full text
Article -
338
Geographical information based false report filtering scheme in wireless sensor networks
Published 2012-02-01Subjects: Get full text
Article -
339
Design of self-adaptive spatio-temporal diversity joint scheduling strategy
Published 2021-07-01Subjects: Get full text
Article -
340