-
401
Adversarial measurements for convolutional neural network-based energy theft detection model in smart grid
Published 2025-03-01Subjects: Get full text
Article -
402
Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
Published 2018-04-01Subjects: Get full text
Article -
403
Verifier-based password-authenticated key exchange protocol for three-party
Published 2008-01-01Subjects: Get full text
Article -
404
Legal and Ethical Considerations in the Use of Force against Civilian Aircraft
Published 2024-03-01Subjects: Get full text
Article -
405
Chandipura virus: The 2024 resurgence and Gujarat outbreak
Published 2024-12-01Subjects: Get full text
Article -
406
App-DDoS detection method based on K-means multiple principal component analysis
Published 2014-05-01Subjects: Get full text
Article -
407
Study of a new packet marking scheme for DDoS attack source traceback
Published 2005-01-01Subjects: Get full text
Article -
408
Multidimensional detection and dynamic defense method for link flooding attack
Published 2019-08-01Subjects: “…link flood attack…”
Get full text
Article -
409
DDoS attack detection and defense based on hybrid deep learning model in SDN
Published 2018-07-01Subjects: Get full text
Article -
410
Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection
Published 2006-01-01Subjects: Get full text
Article -
411
Intellectualized forensic technique for Android pattern locks
Published 2022-02-01Subjects: Get full text
Article -
412
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01Subjects: Get full text
Article -
413
Measuring and analyzing node families in the Tor anonymous communication network
Published 2015-02-01Subjects: Get full text
Article -
414
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01Subjects: Get full text
Article -
415
Website defense strategy selection method based on attack-defense game and Monte Carlo simulation
Published 2018-08-01Subjects: “…attack-defense game…”
Get full text
Article -
416
Meet-in-the-middle attack on 11-round 3D cipher
Published 2015-08-01Subjects: Get full text
Article -
417
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01Subjects: Get full text
Article -
418
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01Subjects: “…side-channel attack…”
Get full text
Article -
419
-
420
Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks
Published 2025-01-01Subjects: Get full text
Article