-
581
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: Get full text
Article -
582
Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN
Published 2016-04-01Subjects: Get full text
Article -
583
Feature extraction of side channel signal based on EMD and difference spectrum of singular value
Published 2016-07-01Subjects: Get full text
Article -
584
Defense policies selection method based on attack-defense signaling game model
Published 2016-05-01Subjects: Get full text
Article -
585
-
586
Partially policy hidden CP-ABE supporting dynamic policy updating
Published 2015-12-01Subjects: “…adaptive chosen plaintext attack secure…”
Get full text
Article -
587
THE FEATURES OF STATISTICAL CHARACTERISTICS TERRORISM ON TRANSPORT
Published 2018-02-01Subjects: Get full text
Article -
588
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01Subjects: Get full text
Article -
589
Fuzzy intrusion detection system for MANET packet dropping attack
Published 2016-10-01Subjects: Get full text
Article -
590
Exploring the Roles of In-Network Caching in ICN
Published 2014-03-01Subjects: Get full text
Article -
591
ECC fault attack algorithm based on Grover's quantum search algorithm with 0.1π phase rotation
Published 2017-08-01Subjects: Get full text
Article -
592
-
593
A Trajectory Prediction Method for Reentry Glide Vehicles via Adaptive Cost Function
Published 2025-01-01Subjects: Get full text
Article -
594
A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones
Published 2025-01-01Subjects: Get full text
Article -
595
Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Published 2025-02-01Subjects: Get full text
Article -
596
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
Published 2025-01-01Subjects: Get full text
Article -
597
CANGuard: An Enhanced Approach to the Detection of Anomalies in CAN-Enabled Vehicles
Published 2025-01-01Subjects: Get full text
Article -
598
Statistical-based detection of pilot contamination attack for NOMA in 5G networks
Published 2025-01-01Subjects: Get full text
Article -
599