-
81
A FUZZY LOGIC MODEL FOR HUMAN DISTRESS DETECTION
Published 2024-01-01Subjects: “…distress detection, fuzzy logic, parameters, physical attack…”
Get full text
Article -
82
-
83
Computer Network Attacks and Modern International Law
Published 2014-04-01Subjects: Get full text
Article -
84
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01Subjects: Get full text
Article -
85
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
86
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01Subjects: “…Backdoor attack…”
Get full text
Article -
87
Post-harvest Fungal Infection in Arabica Coffee Beans (Coffea arabica Linnaeus) in the Coffee Center of West Sumatra Province, Indonesia
Published 2022-12-01Subjects: “…Attack, Aspergillus niger, Aspergillus flavus, Aspergillus ochraceus, storage…”
Get full text
Article -
88
Lysosome-related proteins may have changes in the urinary exosomes of patients with acute gout attack
Published 2025-01-01Subjects: “…Acute gout attack…”
Get full text
Article -
89
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01Subjects: Get full text
Article -
90
Lvov and Sandomir Offensive Operation: the Look 70 Years
Published 2015-02-01Subjects: Get full text
Article -
91
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks
Published 2025-01-01Subjects: Get full text
Article -
92
Damage modelling in concrete subject to sulfate attack
Published 2014-07-01Subjects: “…Sulfate attack; Concrete; Damage; Finite Element Method; Porous Media.…”
Get full text
Article -
93
Enhancing adversarial transferability with local transformation
Published 2024-11-01Subjects: Get full text
Article -
94
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
Published 2024-06-01Subjects: “…cyber attack…”
Get full text
Article -
95
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01Subjects: Get full text
Article -
96
An Adversarial Attack via Penalty Method
Published 2025-01-01Subjects: “…Adversarial attack…”
Get full text
Article -
97
Coupled effects of chlorides and sulfates on steel reinforcement corrosion in concrete structures: A comprehensive review
Published 2025-07-01Subjects: Get full text
Article -
98
Flow-induced Flutter Derivatives of Bridge Decks
Published 2025-02-01Subjects: Get full text
Article -
99
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
100
DCWM-LSTM: A Novel Attack Detection Framework for Robotic Arms
Published 2025-01-01Subjects: “…Attack detection…”
Get full text
Article