-
141
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
142
Research on extended access control mechanism in online social network
Published 2021-10-01Subjects: Get full text
Article -
143
Prediction of Network Threats and Attacks by Mathematical Simulation
Published 2024-11-01Subjects: Get full text
Article -
144
THE ROLE OF INTERNATIONAL LEGAL INSTRUMENTS IN THE FORMATION OF A SECURITY ENVIRONMENT
Published 2024-05-01Subjects: “…security environment, international legal instrument, information security, international terrorism, international obligations.…”
Get full text
Article -
145
Power model in power analysis attack
Published 2012-09-01Subjects: “…information security…”
Get full text
Article -
146
On the parameter selection of randomness test
Published 2009-01-01Subjects: “…information security…”
Get full text
Article -
147
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01Subjects: Get full text
Article -
148
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
149
CONCEPTUALIZATION OF THE INTERNATIONAL COOPERATION IN THE FIELD OF SCIENCE AND TECHNOLOGY
Published 2019-01-01Subjects: Get full text
Article -
150
Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information
Published 2017-07-01Subjects: Get full text
Article -
151
Study on the destination selection methods in router-level Internet topology measurement
Published 2006-01-01Subjects: “…information security…”
Get full text
Article -
152
Survey of capacity limits and implementation techniques in wireless covert communication
Published 2022-08-01Subjects: Get full text
Article -
153
ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES
Published 2018-10-01Subjects: “…information security…”
Get full text
Article -
154
Legal aspects of functional security standardisation of the Internet of Things
Published 2023-09-01Subjects: Get full text
Article -
155
AKADEMİK YAŞANTIDA SANAL TEHDİTLER VE VAKALAR ÜZERİNE BİR ANALİZ - AN ANALYSIS THROUGH CASES AND CYBER THREATS IN ACADEMIC LIFE
Published 2018-06-01Subjects: “…information security…”
Get full text
Article -
156
Readiness of Higher Education Institutions for Digital Transformation Processes
Published 2021-07-01Subjects: Get full text
Article -
157
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01Subjects: “…information security…”
Get full text
Article -
158
Model of fuzzy risk assessment of the information system
Published 2007-01-01Subjects: “…information security…”
Get full text
Article -
159
Management of calls and threats in digital economy of Russia
Published 2018-06-01Subjects: Get full text
Article -
160
Security evaluation method for confidential and stable complex systems
Published 2019-04-01Subjects: Get full text
Article