-
1
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article -
2
A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS
Published 2024-12-01Subjects: “…cyber attacks…”
Get full text
Article -
3
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
4
APDL: an adaptive step size method for white-box adversarial attacks
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
5
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
6
A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm
Published 2025-01-01Subjects: “…Acoustic side channel attack…”
Get full text
Article -
7
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: Get full text
Article -
8
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
9
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
10
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01Subjects: Get full text
Article -
11
Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
Published 2023-09-01Subjects: “…load redistribution attacks…”
Get full text
Article -
12
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01Subjects: Get full text
Article -
13
Application of Tchebichef moment in image watermarking techniques
Published 2003-01-01Subjects: Get full text
Article -
14
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
15
Le défi Charlie : les médias à l’épreuve des attentats
Published 2018-12-01Subjects: Get full text
Article -
16
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01Subjects: Get full text
Article -
17
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01Subjects: Get full text
Article -
18
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01Subjects: Get full text
Article -
19
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks
Published 2024-10-01Subjects: Get full text
Article -
20
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
Published 2016-06-01Subjects: Get full text
Article