-
161
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
162
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
163
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
164
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
165
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01“…EURASIP Journal on Information Security…”
Get full text
Article -
166
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01“…EURASIP Journal on Information Security…”
Get full text
Article -
167
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
Get full text
Article -
168
An End-to-End Rumor Detection Model Based on Feature Aggregation
Published 2021-01-01Get full text
Article -
169
-
170
Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah
Published 2024-12-01“…Surveys were conducted with decision-makers and technical managers related to information security. The results of the study show that decision-makers prioritize the information security management framework, while technical managers focus more on technological aspects. …”
Get full text
Article -
171
The Relationship Between Emotional and Other Factors in Information Diffusion
Published 2025-01-01Get full text
Article -
172
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Published 2013-01-01Get full text
Article -
173
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01Get full text
Article -
174
A Stackelberg-Game-Based Power Control Algorithm for Wireless Mesh Networks
Published 2013-01-01Get full text
Article -
175
-
176
-
177
Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) pada Jaringan (Studi Kasus: UIN Sunan Kalijaga Yogyakarta)
Published 2021-11-01“…Evaluation of information security management using the information security index (KAMI) conducted on the network at UIN Sunan Kalijaga Yogyakarta obtained an index result of 407, which is considered still not optimal. …”
Get full text
Article -
178
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01Get full text
Article -
179
-
180
CONSTRUCTION OF THE FUTURE: THE EXPERIENCE OF PHASED IMPROVEMENT OF ENGINEERING EDUCATION
Published 2017-06-01Get full text
Article