-
141
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01Subjects: “…network security…”
Get full text
Article -
142
Method for determining the lengths of protocol keywords based on maximum likelihood probability
Published 2016-06-01Subjects: Get full text
Article -
143
End hopping based on message tampering
Published 2013-12-01Subjects: “…network security…”
Get full text
Article -
144
Botnet detecting method based on group-signature filter
Published 2010-01-01Subjects: “…network security…”
Get full text
Article -
145
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
146
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01Subjects: “…network security…”
Get full text
Article -
147
Analysis of Development Trend and Technology of New Generation Internet
Published 2013-04-01Subjects: Get full text
Article -
148
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01Subjects: Get full text
Article -
149
Research on alert correlation method based on alert confidence in multi-IDS environment
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
150
Research and implementation of reputation-based inter-domain routing selection mechanism
Published 2023-06-01Subjects: Get full text
Article -
151
AS-level model for restraining DoS attacks
Published 2013-09-01Subjects: “…network security…”
Get full text
Article -
152
Multi-level loss object tracking adversarial attack method based on spatial perception
Published 2021-11-01Subjects: Get full text
Article -
153
Study of a new packet marking scheme for DDoS attack source traceback
Published 2005-01-01Subjects: “…network security…”
Get full text
Article -
154
Finite automaton intrusion tolerance system model based on Markov
Published 2019-10-01Subjects: “…network security…”
Get full text
Article -
155
Study of high-speed malicious Web page detection system based on two-step classifier
Published 2017-08-01Subjects: Get full text
Article -
156
Study on the 5GC security situational awareness system
Published 2022-11-01Subjects: Get full text
Article -
157
Research prospects of user information detection from encrypted traffic of mobile devices
Published 2021-02-01Subjects: Get full text
Article -
158
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
Published 2011-01-01Subjects: Get full text
Article -
159
ABE-IBS based signature-encryption method for WSN
Published 2010-01-01Subjects: Get full text
Article -
160
Research on network traffic classification based on machine learning and deep learning
Published 2021-03-01Subjects: Get full text
Article