-
1
Counting workflow satisfiability with exclusion constraints based on backtracking tree-decomposition
Published 2016-10-01Subjects: Get full text
Article -
2
Information flow integrity measurement method using integrity threat tree
Published 2019-04-01Subjects: Get full text
Article -
3
Research of Hamming weight-based algebraic side-channel attack on LED
Published 2013-07-01Subjects: Get full text
Article -
4
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01Subjects: Get full text
Article -
5
Improvement and evaluation for algebraic fault attacks on PRESENT
Published 2016-08-01Subjects: Get full text
Article -
6
Personal data privacy protection method based onvertical partitioning
Published 2024-10-01Subjects: Get full text
Article -
7
Constraint analysis for extended dynamic fault tree
Published 2017-09-01Subjects: Get full text
Article -
8
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: Get full text
Article -
9
MODELING MOVEMENT OF OBJECTS WITHOUT STOPS IN A NETWORK OF CROSSING ROUTES
Published 2018-03-01Subjects: Get full text
Article -
10
Network moving target defense technique based on optimal forwarding path migration
Published 2017-03-01Subjects: Get full text
Article -
11
-
12
Assessing grout imperfections in prestressed concrete using MWCNTs and temperature-magnetic response techniques
Published 2025-07-01Subjects: Get full text
Article -
13
Study of effective factors on the rate of citizen\'s trust to the municipal performance of Sari city
Published 2023-09-01Subjects: Get full text
Article