-
41
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: “…denial of service attacks…”
Get full text
Article -
42
Clinical presentation and impact of internal carotid artery kinking in children
Published 2024-12-01Subjects: Get full text
Article -
43
Improving the information security sustainability of the economy financial sector
Published 2023-06-01Subjects: Get full text
Article -
44
Task-Oriented Adversarial Attacks for Aspect-Based Sentiment Analysis Models
Published 2025-01-01Subjects: “…adversarial attacks…”
Get full text
Article -
45
Intolerance, Religious Lynchings and the Future of Indonesia
Published 2011-02-01Subjects: Get full text
Article -
46
Understanding Xenophobic Attacks in South Africa: A Systematic Literature Review
Published 2025-02-01Subjects: Get full text
Article -
47
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
48
Trust Management in Social Internet of Things (SIoT): A Survey
Published 2022-01-01Subjects: Get full text
Article -
49
Adversarial attacks and defenses in deep learning
Published 2020-10-01Subjects: Get full text
Article -
50
DDoS defense with IP traceback and path identification
Published 2011-01-01Subjects: Get full text
Article -
51
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01Subjects: Get full text
Article -
52
Survey on Low Energy Adaptive Clustering Hierarchical Protocol
Published 2022-09-01Subjects: Get full text
Article -
53
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Subjects: Get full text
Article -
54
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: Get full text
Article -
55
-
56
THREATS TO BUSINESS ACCOUNTING DATA IN THE DIGITAL AGE
Published 2024-12-01Subjects: Get full text
Article -
57
Difference between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-12-01Subjects: Get full text
Article -
58
A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
Published 2025-01-01Subjects: “…Cyber Attacks…”
Get full text
Article -
59
Adversarial Attack Detection in Smart Grids Using Deep Learning Architectures
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
60
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01Subjects: Get full text
Article