-
501
Research on SSDF Attack and Defense for Cooperative Spectrum Sensing
Published 2014-01-01Subjects: “…spectrum sensing data falsification attack…”
Get full text
Article -
502
Research on filter-based adversarial feature selection against evasion attacks
Published 2023-07-01Subjects: Get full text
Article -
503
Minimum-cost network hardening algorithm based on stochastic loose optimize strategy
Published 2015-01-01Subjects: Get full text
Article -
504
Research of power preprocessing optimization-based template attack on LED
Published 2014-03-01Subjects: Get full text
Article -
505
PCA-based membership inference attack for machine learning models
Published 2022-01-01Subjects: Get full text
Article -
506
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01Subjects: “…russia, as, nato, cyber warfare, space technology hegemony, great power politics, cyber attack…”
Get full text
Article -
507
-
508
Survey of attack and detection based on the full life cycle of APT
Published 2024-09-01Subjects: Get full text
Article -
509
Defense decision-making method based on incomplete information stochastic game and Q-learning
Published 2018-08-01Subjects: “…network attack and defense…”
Get full text
Article -
510
Defense decision-making method based on incomplete information stochastic game
Published 2018-08-01Subjects: “…network attack-defense…”
Get full text
Article -
511
State Estimation in Power Systems Under False Data Injection Attack Using Total Least Squares
Published 2025-01-01Subjects: Get full text
Article -
512
STUDY ON FLOW CHARACTERISTICS OF WAVE-SHAPED RODS WITH SPATIAL ANGLE OF ATTACK
Published 2021-01-01Subjects: Get full text
Article -
513
Digital watermarking algorithm in SWT domain based on robust local feature
Published 2019-11-01Subjects: Get full text
Article -
514
Variable threshold energy detection algorithm based on trust degree
Published 2018-08-01Subjects: “…probabilistic spectrum sensing data falsification attack…”
Get full text
Article -
515
Improved chosen-plaintext power analysis attack against SM4 at the round-output
Published 2015-10-01Subjects: Get full text
Article -
516
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: Get full text
Article -
517
SenLeash:a restricted defense mechanism against wormhole attacks in wireless sensor network
Published 2013-10-01Subjects: Get full text
Article -
518
Pseudo 4D projective coordinate-based multi-base scalar multiplication
Published 2018-05-01Subjects: Get full text
Article -
519
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
520
Reputation computation based on new metric in P2P network
Published 2008-01-01Subjects: Get full text
Article