-
161
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: Get full text
Article -
162
High order DPA with profiling
Published 2018-09-01Subjects: “…side channel attack…”
Get full text
Article -
163
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: Get full text
Article -
164
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: Get full text
Article -
165
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
Published 2013-06-01Subjects: Get full text
Article -
166
Gradient purification federated adaptive learning algorithm for Byzantine attack resistance
Published 2024-10-01Subjects: Get full text
Article -
167
Survey of optical-based physical domain adversarial attacks and defense
Published 2024-04-01Subjects: “…adversarial attack…”
Get full text
Article -
168
A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects
Published 2025-01-01Subjects: Get full text
Article -
169
-
170
Analysis Of Attack Velocity and Accuracy in Banjarbaru City Fencing Athletes
Published 2024-06-01Subjects: Get full text
Article -
171
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: Get full text
Article -
172
A systematic review of AI-enhanced techniques in credit card fraud detection
Published 2025-01-01Subjects: “…Fraud attacks…”
Get full text
Article -
173
Multitier ensemble classifiers for malicious network traffic detection
Published 2018-10-01Subjects: Get full text
Article -
174
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01Subjects: “…attack graph…”
Get full text
Article -
175
SAR-PATT: A Physical Adversarial Attack for SAR Image Automatic Target Recognition
Published 2024-12-01Subjects: Get full text
Article -
176
A Secure and Efficient White-Box Implementation of SM4
Published 2024-12-01Subjects: “…differential computation attack…”
Get full text
Article -
177
Improved preimage and pseudo-collision attacks on SM3 hash function
Published 2018-01-01Subjects: Get full text
Article -
178
Optimal active defense decision model of wireless communication network under APT attack
Published 2024-02-01Subjects: “…APT attack…”
Get full text
Article -
179
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
Published 2022-02-01Subjects: Get full text
Article -
180
Secure network coding method merged with timestamp and homomorphic signature
Published 2013-04-01Subjects: Get full text
Article