-
381
Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers
Published 2024-01-01Subjects: Get full text
Article -
382
Secure deployment strategy of virtual machines based on operating system diversity
Published 2017-10-01Subjects: Get full text
Article -
383
AFault Tolerant Multi-Controller Framework for SDN DDoS Attacks Detection
Published 2022-01-01Subjects: Get full text
Article -
384
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01Subjects: Get full text
Article -
385
Research review of network defense decision-making methods based on attack and defense game
Published 2022-02-01Subjects: Get full text
Article -
386
Penetration test method using blind SQL injection based on second-order fragment and reassembly
Published 2017-10-01Subjects: Get full text
Article -
387
LEACH protocol based security mechanism for Sybil attack detection
Published 2011-01-01Subjects: Get full text
Article -
388
SDN security prediction method based on bayesian attack graph
Published 2021-11-01Subjects: Get full text
Article -
389
Research on link detection technology based on dynamic browser fingerprint
Published 2022-08-01Subjects: Get full text
Article -
390
Game theory-based malware propagation model for wireless sensor network
Published 2018-11-01Subjects: Get full text
Article -
391
Protocol to enhance the security of Early data in TLS 1.3
Published 2017-12-01Subjects: Get full text
Article -
392
Research on FAHP based Trojan attack effect evaluation
Published 2016-07-01Subjects: Get full text
Article -
393
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
394
New approach against Sybil attack in wireless sensor networks
Published 2008-01-01Subjects: Get full text
Article -
395
Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network
Published 2018-01-01Subjects: Get full text
Article -
396
-
397
Efficient attack detection and data aggregation algorithm
Published 2012-09-01Subjects: Get full text
Article -
398
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01Subjects: Get full text
Article -
399
Privacy protection system based on Hook for Android
Published 2018-04-01Subjects: Get full text
Article -
400
Multi-level loss object tracking adversarial attack method based on spatial perception
Published 2021-11-01Subjects: Get full text
Article