-
541
RUSSIA'S STRATEGIC DETERRENCE AND DEFENSE AGAINST POTENTIAL MEANS AND METHODS OF STRATEGIC ATTACK
Published 2019-01-01Subjects: “…strategic attack…”
Get full text
Article -
542
Modeling and security analysis of hardware trojan attack based on GSCPN
Published 2024-08-01Subjects: Get full text
Article -
543
Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head
Published 2017-11-01Subjects: Get full text
Article -
544
Optimizing Solid Oxide Fuel Cell Performance Using Advanced Meta-Heuristic Algorithms
Published 2024-06-01Subjects: Get full text
Article -
545
Vegetative status in patients with transient ischemic attack and stroke
Published 2018-06-01Subjects: “…transient ischemic attack…”
Get full text
Article -
546
Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism
Published 2014-03-01Subjects: Get full text
Article -
547
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: Get full text
Article -
548
Multi-stage detection method for APT attack based on sample feature reinforcement
Published 2022-12-01Subjects: “…APT attack detection…”
Get full text
Article -
549
Research progress on dynamic hopping technology for network layer
Published 2021-12-01Subjects: Get full text
Article -
550
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Subjects: Get full text
Article -
551
New collaborative DDoS defense technology based on NFV
Published 2019-04-01Subjects: “…distributed denial of service attack…”
Get full text
Article -
552
Defense strategies selection based on attack-defense evolutionary game model
Published 2017-01-01Subjects: “…network attack-defense…”
Get full text
Article -
553
Electromagnetic signal fast adversarial attack method based on Jacobian saliency map
Published 2024-01-01Subjects: Get full text
Article -
554
Adversarial example generation method for SAR images based on mask extraction
Published 2024-03-01Subjects: Get full text
Article -
555
-
556
A survey of attack and defense on human-computer interaction security
Published 2019-10-01Subjects: Get full text
Article -
557
-
558
TCN-Based DDoS Detection and Mitigation in 5G Healthcare-IoT: A Frequency Monitoring and Dynamic Threshold Approach
Published 2025-01-01Subjects: Get full text
Article -
559
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
560
Design of key technologies for intranet dynamic gateway based on DPDK
Published 2020-06-01Subjects: Get full text
Article