-
521
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01Subjects: Get full text
Article -
522
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01Subjects: “…False data injection attack…”
Get full text
Article -
523
Prior Anticoagulation and Risk of Hemorrhagic Transformation in Acute Stroke: A Post Hoc Analysis of the PRODAST Study
Published 2025-02-01Subjects: Get full text
Article -
524
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01Subjects: Get full text
Article -
525
Detection of sybil attacks based on periodic ultra wide band distance information in WSN
Published 2016-08-01Subjects: Get full text
Article -
526
Design and performance analysis of energy efficiency based CR primary user emulation attack defensive scheme
Published 2017-08-01Subjects: “…primary user emulation attack…”
Get full text
Article -
527
Generation a shared secret using artificial neural networks
Published 2019-08-01Subjects: Get full text
Article -
528
Optimal strategy selection approach of moving target defense based on Markov time game
Published 2020-01-01Subjects: Get full text
Article -
529
Friend-Guard Textfooler Attack on Text Classification System
Published 2025-01-01Subjects: Get full text
Article -
530
-
531
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: Get full text
Article -
532
VMI-based virtual machine remote attestation scheme
Published 2018-12-01Subjects: Get full text
Article -
533
Association of Slender Patent Ductus Arteriosus Combined With PFO Related to the Transient Ischemic Attack: A Rare Case Report
Published 2025-01-01Subjects: Get full text
Article -
534
-
535
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01Subjects: Get full text
Article -
536
App-DDoS detection method using partial binary tree based SVM algorithm
Published 2018-03-01Subjects: “…App-DDoS attack…”
Get full text
Article -
537
-
538
Enhancing the Strength and Durability Behaviour of Concrete Produced with Brown-Loamy Kaolin Clay Polymer
Published 2024-06-01Subjects: Get full text
Article -
539
Survey of software anomaly detection based on deception
Published 2022-02-01Subjects: Get full text
Article -
540
Smart-blacklisting:an efficient methodology for mitigating fake block attack in P2P file-sharing systems
Published 2013-08-01Subjects: Get full text
Article