Suggested Topics within your search.
Suggested Topics within your search.
-
1
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Published 2021-05-01Subjects: Get full text
Article -
2
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01Subjects: “…computer network security…”
Get full text
Article -
3
A behavioural in‐depth analysis of ransomware infection
Published 2021-01-01Subjects: Get full text
Article -
4
Authorisation inconsistency in IoT third‐party integration
Published 2022-03-01Subjects: Get full text
Article -
5
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
Published 2024-12-01Subjects: “…computer network security…”
Get full text
Article -
6
On the performance of non‐profiled side channel attacks based on deep learning techniques
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
7
HealthChain: A blockchain‐based framework for secure and interoperable electronic health records (EHRs)
Published 2024-12-01Subjects: Get full text
Article -
8
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
Published 2024-09-01Subjects: “…computer network security…”
Get full text
Article -
9
A fast user actual privilege reasoning framework based on privilege dependency graph reduction
Published 2023-05-01Subjects: “…computer network security…”
Get full text
Article -
10
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104
Published 2024-09-01Subjects: “…computer network security…”
Get full text
Article -
11
Joint safety and security risk analysis in industrial cyber‐physical systems: A survey
Published 2024-12-01Subjects: “…computer network security…”
Get full text
Article -
12
A Petri net model for Time‐Delay Attack detection in Precision Time Protocol‐based networks
Published 2024-12-01Subjects: “…computer network security…”
Get full text
Article -
13
Adaptive and survivable trust management for Internet of Things systems
Published 2021-09-01Subjects: Get full text
Article -
14
Balancing Usability and Protection: A Decision-Making Approach to Computer Network Security Evaluation using the Neutrosophic Fuzzy Dombi Operator
Published 2025-05-01Subjects: Get full text
Article -
15
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
16
Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations
Published 2024-12-01Subjects: Get full text
Article -
17
Solving blockchain trilemma using off‐chain storage protocol
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
18
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
19
Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring
Published 2024-12-01Subjects: Get full text
Article -
20
DGA domain detection and botnet prevention using Q-learning for POMDP
Published 2021-03-01Subjects: Get full text
Article