-
481
Detection of Adversarial Attacks Using Deep Learning and Features Extracted From Interpretability Methods in Industrial Scenarios
Published 2025-01-01Subjects: Get full text
Article -
482
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01Subjects: Get full text
Article -
483
Qualification problems of war-related criminal offences documented on the de-occupied territories of Ukraine
Published 2022-09-01Subjects: Get full text
Article -
484
Membership inference attack and defense method in federated learning based on GAN
Published 2023-05-01Subjects: Get full text
Article -
485
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
486
Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack
Published 2024-12-01Subjects: Get full text
Article -
487
Review on security risks of key components in industrial control system
Published 2022-06-01Subjects: Get full text
Article -
488
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01Subjects: “…low-rate denial of service attack…”
Get full text
Article -
489
Demand-Driven Resilient Control for Generation Unit of Local Power Plant Under Unreliable Communication
Published 2025-01-01Subjects: Get full text
Article -
490
A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
Published 2025-01-01Subjects: Get full text
Article -
491
Power analysis attack of dynamic password token based on SM3
Published 2017-03-01Subjects: Get full text
Article -
492
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
Published 2008-01-01Subjects: Get full text
Article -
493
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Subjects: Get full text
Article -
494
ID-based server-aided verification signature scheme with strong unforgeability
Published 2016-06-01Subjects: Get full text
Article -
495
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01Subjects: “…side-channel attack…”
Get full text
Article -
496
Support Vector Machine (SVM) based Detection for Volumetric Bandwidth Distributed Denial of Service (DVB-DDOS) attack within gigabit Passive Optical Network
Published 2025-01-01Subjects: “…attack detection system…”
Get full text
Article -
497
Runtime verification approach for DoS attack detection in edge servers
Published 2021-09-01Subjects: Get full text
Article -
498
Parameter Identification and Control Method of a Hypersonic Wind Tunnel Attack Angle Mechanism
Published 2020-10-01Subjects: “…Attack angle mechanism…”
Get full text
Article -
499
-
500
Transferable Targeted Adversarial Attack on Synthetic Aperture Radar (SAR) Image Recognition
Published 2025-01-01Subjects: Get full text
Article