-
1
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article -
2
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
3
APDL: an adaptive step size method for white-box adversarial attacks
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
4
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
5
A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm
Published 2025-01-01Subjects: “…Acoustic side channel attack…”
Get full text
Article -
6
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
7
The Importance of Security Awareness in Combating Phishing Attacks: A Case Study of Bank Rakyat Indonesia
Published 2024-11-01Subjects: Get full text
Article -
8
Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
Published 2023-09-01Subjects: “…load redistribution attacks…”
Get full text
Article -
9
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01Subjects: Get full text
Article -
10
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
11
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01Subjects: Get full text
Article -
12
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01Subjects: Get full text
Article -
13
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01Subjects: Get full text
Article -
14
Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks
Published 2024-10-01Subjects: Get full text
Article -
15
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
Published 2016-06-01Subjects: Get full text
Article -
16
Expecting the Unexpected: Predicting Panic Attacks From Mood, Twitter, and Apple Watch Data
Published 2024-01-01Subjects: “…Panic attacks…”
Get full text
Article -
17
Investigation of the correlation of C1 esterase inhibitor levels and functions with attack severity and frequency in hereditary angioedema
Published 2024-06-01Subjects: Get full text
Article -
18
Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation
Published 2022-09-01Subjects: “…adversarial attacks…”
Get full text
Article -
19
A Multi-Faceted Approach to Trending Topic Attack Detection Using Semantic Similarity and Large-Scale Datasets
Published 2025-01-01Subjects: “…Trending topic attacks…”
Get full text
Article -
20