-
1
Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT
Published 2024-11-01Subjects: Get full text
Article -
2
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article -
3
Neutrosophic Set and Machine Learning Model for Identifying Botnet Attacks on IoT Effectively
Published 2025-07-01Subjects: Get full text
Article -
4
A Backdoor Approach With Inverted Labels Using Dirty Label-Flipping Attacks
Published 2025-01-01Subjects: “…Poisoning attacks…”
Get full text
Article -
5
Simulated Adversarial Attacks on Traffic Sign Recognition of Autonomous Vehicles
Published 2025-04-01Subjects: Get full text
Article -
6
Fortify the Guardian, Not the Treasure: Resilient Adversarial Detectors
Published 2024-11-01Subjects: Get full text
Article -
7
A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey
Published 2025-01-01Subjects: “…Covert-channel attacks…”
Get full text
Article -
8
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
9
Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations
Published 2024-02-01Subjects: Get full text
Article -
10
Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems
Published 2025-01-01Subjects: Get full text
Article -
11
An Indian Gaur (Bos gaurus) Gores in the Western Ghats-A case report
Published 2025-08-01Subjects: “…Bos gaurus attack…”
Get full text
Article -
12
Laser Guard: Efficiently Detecting Laser-Based Physical Adversarial Attacks in Autonomous Driving
Published 2025-01-01Subjects: Get full text
Article -
13
EarlyExodus: Leveraging early exits to mitigate backdoor vulnerability in deep learning
Published 2025-09-01Subjects: Get full text
Article -
14
The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges
Published 2025-04-01Subjects: Get full text
Article -
15
Beyond encryption: How deep learning can break microcontroller security through power analysis
Published 2025-03-01Subjects: Get full text
Article -
16
Trustworthiness of Deep Learning Under Adversarial Attacks in Power Systems
Published 2025-05-01Subjects: “…adversarial attacks…”
Get full text
Article -
17
Disruptive attacks on artificial neural networks: A systematic review of attack techniques, detection methods, and protection strategies
Published 2025-06-01Subjects: “…Fault injection attacks…”
Get full text
Article -
18
-
19
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
20
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article