-
101
Fail-Safe Logic Design Strategies Within Modern FPGA Architectures
Published 2025-01-01Subjects: Get full text
Article -
102
Social risks of internet activity of virtual communities
Published 2023-10-01Subjects: Get full text
Article -
103
Detection of SSL/TLS protocol attacks based on flow spectrum theory
Published 2022-02-01Subjects: “…SSL/TLS attacks…”
Get full text
Article -
104
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
105
Cascaded intrusion detection system using machine learning
Published 2025-12-01Subjects: Get full text
Article -
106
Algebraic fault attack on PRESENT
Published 2012-08-01Subjects: “…fault attack…”
Get full text
Article -
107
Graph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability
Published 2025-01-01Subjects: Get full text
Article -
108
-
109
Online and Offline Identification of False Data Injection Attacks in Battery Sensors Using a Single Particle Model
Published 2024-01-01Subjects: Get full text
Article -
110
MSRD-CNN: Multi-Scale Residual Deep CNN for General-Purpose Image Manipulation Detection
Published 2022-01-01Subjects: Get full text
Article -
111
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: Get full text
Article -
112
Securing Brain-to-Brain Communication Channels Using Adversarial Training on SSVEP EEG
Published 2025-01-01Subjects: Get full text
Article -
113
International study of the perceived stress and psychological impact of the 7 October attacks on Holocaust survivors
Published 2025-12-01Subjects: Get full text
Article -
114
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks
Published 2025-01-01Subjects: “…Man-in-the-middle (MitM) attacks…”
Get full text
Article -
115
-
116
Output Feedback-Based Fuzzy Event-Triggered Synchronization Control for Nonlinear Multiagent Systems Under DoS Attacks
Published 2025-01-01Subjects: Get full text
Article -
117
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01Subjects: Get full text
Article -
118
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Published 2024-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
119
Novel extended multivariate public key cryptosystem
Published 2014-04-01Subjects: Get full text
Article -
120
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: “…attack prediction…”
Get full text
Article