-
461
Random routing defense method based on deep deterministic policy gradient
Published 2021-06-01Subjects: Get full text
Article -
462
Detecting and preventing collusion attack in DPoS based on power index
Published 2022-12-01Subjects: Get full text
Article -
463
Targeted Discrepancy Attacks: Crafting Selective Adversarial Examples in Graph Neural Networks
Published 2025-01-01Subjects: Get full text
Article -
464
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01Subjects: Get full text
Article -
465
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
466
EBS-based efficient and secure group key management in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
467
Membership inference attacks against transfer learning for generalized model
Published 2021-10-01Subjects: “…membership inference attack…”
Get full text
Article -
468
-
469
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01Subjects: Get full text
Article -
470
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2024-11-01Subjects: Get full text
Article -
471
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: Get full text
Article -
472
Research on low-rate DDoS attack of SDN network in cloud environment
Published 2019-06-01Subjects: Get full text
Article -
473
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01Subjects: Get full text
Article -
474
Analysis of provably secure on-demand source routing in MANET
Published 2009-01-01Subjects: Get full text
Article -
475
Preventing flow table overflow against denial of service attack in software defined network
Published 2023-02-01Subjects: Get full text
Article -
476
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01Subjects: Get full text
Article -
477
Rule-defect oriented browser XSS filter test method
Published 2018-11-01Subjects: “…cross-site scripting attack…”
Get full text
Article -
478
Unsupervised detection method of RoQ covert attacks based on multilayer features
Published 2022-09-01Subjects: “…RoQ converts attack…”
Get full text
Article -
479
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: Get full text
Article -
480
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: Get full text
Article