-
21
Adversarial Robust Modulation Recognition Guided by Attention Mechanisms
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
22
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Published 2022-09-01Subjects: Get full text
Article -
23
Clinical presentation and impact of internal carotid artery kinking in children
Published 2024-12-01Subjects: Get full text
Article -
24
Improving the information security sustainability of the economy financial sector
Published 2023-06-01Subjects: Get full text
Article -
25
Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models
Published 2025-01-01Subjects: “…adversarial attacks…”
Get full text
Article -
26
Intolerance, Religious Lynchings and the Future of Indonesia
Published 2011-02-01Subjects: Get full text
Article -
27
Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review
Published 2025-02-01Subjects: Get full text
Article -
28
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
29
Survey on Low Energy Adaptive Clustering Hierarchical Protocol
Published 2022-09-01Subjects: Get full text
Article -
30
Difference between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-12-01Subjects: Get full text
Article -
31
Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
32
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01Subjects: Get full text
Article -
33
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
34
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01Subjects: “…DoS attacks…”
Get full text
Article -
35
-
36
Quantized <italic>l</italic>₂-<italic>l</italic>∞ Control for Nonlinear Discrete-Time Systems With DoS Attacks
Published 2025-01-01Subjects: “…DoS attacks…”
Get full text
Article -
37
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Subjects: “…DDoS attacks…”
Get full text
Article -
38
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
39
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
40
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
Published 2013-10-01Subjects: Get full text
Article