-
61
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
Published 2024-12-01Subjects: Get full text
Article -
62
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01Subjects: “…DoS attacks…”
Get full text
Article -
63
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01Subjects: “…control flow hijacking attacks…”
Get full text
Article -
64
Searchable public key encryption with designated verifier secure against the server
Published 2014-11-01Subjects: Get full text
Article -
65
Digital Health: The Cybersecurity for AI-Based Healthcare Communication
Published 2025-01-01Subjects: Get full text
Article -
66
-
67
Multibit image watermarking algorithm resistant to geometric attacks based on level set method
Published 2011-01-01Subjects: Get full text
Article -
68
Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game
Published 2025-01-01Subjects: Get full text
Article -
69
Reputation mechanism based on multi-path routing protocol in ad hoc networks
Published 2008-01-01Subjects: Get full text
Article -
70
Certificateless generalized signcryption scheme in the standard model
Published 2017-04-01Subjects: “…malicious-but-passive KGC attacks…”
Get full text
Article -
71
L’abdication du Congrès après le 11 septembre : crise constitutionnelle ou politique ?
Published 2011-09-01Subjects: Get full text
Article -
72
Quantized <italic>l</italic>₂-<italic>l</italic>∞ Control for Nonlinear Discrete-Time Systems With DoS Attacks
Published 2025-01-01Subjects: “…DoS attacks…”
Get full text
Article -
73
Effects on lifetime of opportunistic network based on Epidemic routing under flooding attacks
Published 2012-09-01Subjects: Get full text
Article -
74
Deep learning-driven defense strategies for mitigating DDoS attacks in cloud computing environments
Published 2025-12-01Subjects: “…DDoS attacks…”
Get full text
Article -
75
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01Subjects: Get full text
Article -
76
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01Subjects: Get full text
Article -
77
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
Published 2013-10-01Subjects: Get full text
Article -
78
Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender Systems
Published 2019-01-01Subjects: Get full text
Article -
79
Privacy Auditing in Differential Private Machine Learning: The Current Trends
Published 2025-01-01Subjects: Get full text
Article -
80
Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems
Published 2025-01-01Subjects: Get full text
Article