-
341
Investigating the repair of cracks through bacterial self-healing for sustainable concrete in aggressive sulfate attack environments
Published 2024-11-01Subjects: Get full text
Article -
342
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: Get full text
Article -
343
Research on low-rate DDoS attack of SDN network in cloud environment
Published 2019-06-01Subjects: Get full text
Article -
344
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01Subjects: Get full text
Article -
345
Analysis of provably secure on-demand source routing in MANET
Published 2009-01-01Subjects: Get full text
Article -
346
Preventing flow table overflow against denial of service attack in software defined network
Published 2023-02-01Subjects: Get full text
Article -
347
Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
Published 2020-06-01Subjects: Get full text
Article -
348
Rule-defect oriented browser XSS filter test method
Published 2018-11-01Subjects: “…cross-site scripting attack…”
Get full text
Article -
349
Unsupervised detection method of RoQ covert attacks based on multilayer features
Published 2022-09-01Subjects: “…RoQ converts attack…”
Get full text
Article -
350
A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm
Published 2025-01-01Subjects: “…Acoustic side channel attack…”
Get full text
Article -
351
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Published 2025-02-01Subjects: Get full text
Article -
352
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: Get full text
Article -
353
Detection of Adversarial Attacks Using Deep Learning and Features Extracted From Interpretability Methods in Industrial Scenarios
Published 2025-01-01Subjects: Get full text
Article -
354
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01Subjects: Get full text
Article -
355
Qualification problems of war-related criminal offences documented on the de-occupied territories of Ukraine
Published 2022-09-01Subjects: Get full text
Article -
356
Membership inference attack and defense method in federated learning based on GAN
Published 2023-05-01Subjects: Get full text
Article -
357
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
358
Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack
Published 2024-12-01Subjects: Get full text
Article -
359
Review on security risks of key components in industrial control system
Published 2022-06-01Subjects: Get full text
Article -
360
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01Subjects: “…low-rate denial of service attack…”
Get full text
Article