Showing 421 - 440 results of 599 for search '"attacks"', query time: 0.03s Refine Results
  1. 421
  2. 422

    Research on active defense based on multi-stage cyber deception game by Yongjin HU, Jun MA, Yuanbo GUO, Han ZHANG

    Published 2020-08-01
    Subjects: “…cyber attack and defense…”
    Get full text
    Article
  3. 423

    Effect of the difference enumeration attack on LowMC instances by Xinxin GE, Zhihu LI, Meiqin WANG, Kai HU

    Published 2021-06-01
    Subjects: “…difference enumeration attack…”
    Get full text
    Article
  4. 424

    Research on the SQL injection filtering based on SQL syntax tree by Chen-wang HAN, Hui LIN, Chuan HUANG

    Published 2016-11-01
    Subjects: “…SQL injection attack…”
    Get full text
    Article
  5. 425
  6. 426
  7. 427
  8. 428
  9. 429
  10. 430
  11. 431
  12. 432
  13. 433
  14. 434
  15. 435
  16. 436
  17. 437
  18. 438

    Related-key rectangle attack on the full ARIRANG encryption mode by ZHANG Peng1, LI Rui-lin1, LI Chao1

    Published 2011-01-01
    Subjects: “…related-key rectangle attack…”
    Get full text
    Article
  19. 439
  20. 440