-
141
Efficient anonymous password-based authenticated key exchange scheme
Published 2009-01-01Subjects: Get full text
Article -
142
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01Subjects: Get full text
Article -
143
Renewable Energy Interconnected Power System Load Frequency Control Under Network Attacks and Communication Time Delay
Published 2025-02-01Subjects: “…renewable energy interconnected power system|network attacks|communication time delay|event triggering|sliding mode load frequency control…”
Get full text
Article -
144
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01Subjects: Get full text
Article -
145
Comparative study of power analysis attacks based on template and KNN algorithm
Published 2022-04-01Subjects: Get full text
Article -
146
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01Subjects: Get full text
Article -
147
Deception defense method against intelligent penetration attack
Published 2022-10-01Subjects: Get full text
Article -
148
-
149
GreyFan:a network attack framework using Wi-Fi covert channel
Published 2019-09-01Subjects: “…HID attack…”
Get full text
Article -
150
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: Get full text
Article -
151
Improved integral attack——random linear distinguish and key recovery attack
Published 2023-04-01Subjects: “…integral attack…”
Get full text
Article -
152
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: Get full text
Article -
153
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
Get full text
Article -
154
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
Published 2015-10-01Subjects: Get full text
Article -
155
Machine learning-based detection, identification and restoration method of jamming attacks in optical networks
Published 2023-07-01Subjects: Get full text
Article -
156
Label flipping adversarial attack on graph neural network
Published 2021-09-01Subjects: Get full text
Article -
157
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01Subjects: Get full text
Article -
158
RESEARCH ON TECHNIQUES TO ENHANCE DDoS ATTACK PREVENTION USING CUMULATIVE SUM AND BACKPROPAGATION ALGORITHMS
Published 2024-12-01Subjects: “…network attack…”
Get full text
Article -
159
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01Subjects: Get full text
Article -
160
A New Attack Recovery Approach and <italic>H</italic>∞ Performance Analysis for LFC Systems With FDI Attacks and Uncertainties
Published 2025-01-01Subjects: “…false data injection (FDI) attacks…”
Get full text
Article