-
281
-
282
The Relationship Between Emotional and Other Factors in Information Diffusion
Published 2025-01-01Get full text
Article -
283
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Published 2013-01-01Get full text
Article -
284
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01Get full text
Article -
285
A Stackelberg-Game-Based Power Control Algorithm for Wireless Mesh Networks
Published 2013-01-01Get full text
Article -
286
-
287
-
288
Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta)
Published 2021-11-01“…Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
Get full text
Article -
289
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01Get full text
Article -
290
-
291
Word Vector Representation of Latin Cuengh Based on Root Feature Enhancement
Published 2024-12-01Get full text
Article -
292
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01Get full text
Article -
293
CONSTRUCTION OF THE FUTURE: THE EXPERIENCE OF PHASED IMPROVEMENT OF ENGINEERING EDUCATION
Published 2017-06-01Get full text
Article -
294
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01Get full text
Article -
295
A novel minimal exposure path problem in wireless sensor networks and its solution algorithm
Published 2016-08-01Get full text
Article -
296
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Published 2015-01-01Get full text
Article -
297
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Information security has been the most common word uttered by any man any device or any peripheral for the past two centuries. …”
Get full text
Thesis -
298
Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks
Published 2021-01-01“…With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. …”
Get full text
Article -
299
Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model
Published 2014-01-01Get full text
Article -
300
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01Get full text
Article