-
1
Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
Published 2024-11-01Subjects: Get full text
Article -
2
Solvability and Nilpotency of Lie Algebras in Cryptography and Steganography
Published 2025-05-01Subjects: Get full text
Article -
3
Security protocol of wireless sensor networks localization: analysis and performance
Published 2025-04-01Subjects: Get full text
Article -
4
Defense and Security Mechanisms in the Internet of Things: A Review
Published 2025-01-01Subjects: Get full text
Article -
5
Property-Based Testing for Cybersecurity: Towards Automated Validation of Security Protocols
Published 2025-05-01Subjects: Get full text
Article -
6
Enhancing Situational Awareness: Anomaly Detection Using Real-Time Video Across Multiple Domains
Published 2025-01-01Subjects: Get full text
Article -
7
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01Subjects: “…security protocols…”
Get full text
Article -
8
The Alliance of BIM and Artificial Intelligence: Challenges for a Reinvented Future – The State of the Art
Published 2025-06-01Subjects: Get full text
Article -
9
-
10
Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
Published 2024-11-01Subjects: “…timed security protocols…”
Get full text
Article -
11
Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things
Published 2025-06-01Subjects: “…internet of things security protocols…”
Get full text
Article -
12
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
13
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01Subjects: Get full text
Article -
14
Design and validation for a remote attestation security protocol
Published 2009-01-01Subjects: “…trusted computing;remote attestation;security protocol;CSP…”
Get full text
Article -
15
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Subjects: “…security protocol…”
Get full text
Article -
16
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
17
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
18
Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols
Published 2025-04-01Subjects: Get full text
Article -
19
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01Subjects: “…security protocol…”
Get full text
Article -
20
A hybrid security protocol based on honey encryption and hyperchaotic systems for improving security in internet of things
Published 2025-05-01Subjects: Get full text
Article