-
61
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: Get full text
Article -
62
Securing Brain-to-Brain Communication Channels Using Adversarial Training on SSVEP EEG
Published 2025-01-01Subjects: Get full text
Article -
63
International study of the perceived stress and psychological impact of the 7 October attacks on Holocaust survivors
Published 2025-12-01Subjects: Get full text
Article -
64
Output Feedback-Based Fuzzy Event-Triggered Synchronization Control for Nonlinear Multiagent Systems Under DoS Attacks
Published 2025-01-01Subjects: Get full text
Article -
65
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01Subjects: Get full text
Article -
66
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01Subjects: Get full text
Article -
67
A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects
Published 2025-01-01Subjects: Get full text
Article -
68
Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay
Published 2025-02-01Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
Get full text
Article -
69
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01Subjects: “…differential computation attack…”
Get full text
Article -
70
Twitter fait-il parler les territoires ? Retour d'expériences à partir des tweets autour de l’attentat du 14 juillet 2016 à Nice
Published 2022-06-01Subjects: Get full text
Article -
71
Recurrent “transient ischemic attacks” caused by pulmonary arteriovenous malformation
Published 2025-01-01Subjects: Get full text
Article -
72
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
Get full text
Article -
73
A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy
Published 2023-09-01Subjects: Get full text
Article -
74
A New Attack Recovery Approach and <italic>H</italic>∞ Performance Analysis for LFC Systems With FDI Attacks and Uncertainties
Published 2025-01-01Subjects: “…false data injection (FDI) attacks…”
Get full text
Article -
75
Evaluation of Relationship between Schemas and Panic Disorder through a Case Treated with Schema Therapy
Published 2014-08-01Subjects: Get full text
Article -
76
Effect of carbonation curing and sodium content on geopolymer subjected to sodium and magnesium sulfate attack
Published 2025-01-01Subjects: “…sulfate attack…”
Get full text
Article -
77
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: Get full text
Article -
78
A systematic review of AI-enhanced techniques in credit card fraud detection
Published 2025-01-01Subjects: “…Fraud attacks…”
Get full text
Article -
79
Kiai sebagai Konselor: Pendekatan Spiritual dalam Mereduksi Panic Attack Santri di Pesantren
Published 2024-12-01Subjects: Get full text
Article -
80
The Impact of Suicide Attacks on Voting Behavior: The Case of November 2015 Early Elections
Published 2018-10-01Subjects: Get full text
Article