-
81
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01Subjects: Get full text
Article -
82
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01Subjects: “…scan-based side-channel attacks…”
Get full text
Article -
83
Detection algorithm for cache pollution attacks based on node state model in content centric networking
Published 2016-09-01Subjects: Get full text
Article -
84
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01Subjects: “…side-channel attacks…”
Get full text
Article -
85
A Lightweight AI-Based Approach for Drone Jamming Detection
Published 2025-01-01Subjects: “…jamming attacks…”
Get full text
Article -
86
-
87
GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY
Published 2013-08-01Subjects: Get full text
Article -
88
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: Get full text
Article -
89
Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments
Published 2024-12-01Subjects: Get full text
Article -
90
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01Subjects: Get full text
Article -
91
Enhanced method based on virtual registers rotation
Published 2018-05-01Subjects: Get full text
Article -
92
Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI
Published 2025-01-01Subjects: Get full text
Article -
93
Neural networks-based event-triggered consensus control for nonlinear multiagent systems with communication link faults and DoS attacks
Published 2024-06-01Subjects: Get full text
Article -
94
Fast anomalous traffic detection system for secure vehicular communications
Published 2024-12-01Subjects: Get full text
Article -
95
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Published 2025-03-01Subjects: Get full text
Article -
96
On the Adversarial Robustness of Decision Trees and a Symmetry Defense
Published 2025-01-01Subjects: “…Adversarial perturbation attacks…”
Get full text
Article -
97
Fast Frequency Control Strategy Based on Worst-Case Network Attack Perception
Published 2024-12-01Subjects: Get full text
Article -
98
Le microphone dans la balance : espaces et enjeux sonores des procès historiques des attentats de Paris et de Nice
Published 2024-10-01Subjects: Get full text
Article -
99
Detection of False Data Injection Attack in Smart Grid Based on Extended Kalman and Smooth Variable Structure Filter
Published 2025-01-01Subjects: Get full text
Article -
100
Experimental assessment of аdversarial attacks to the deep neural networks in medical image recognition
Published 2019-09-01Subjects: “…adversarial attacks…”
Get full text
Article