-
461
Feature extraction of side channel signal based on EMD and difference spectrum of singular value
Published 2016-07-01Subjects: Get full text
Article -
462
Defense policies selection method based on attack-defense signaling game model
Published 2016-05-01Subjects: Get full text
Article -
463
-
464
Partially policy hidden CP-ABE supporting dynamic policy updating
Published 2015-12-01Subjects: “…adaptive chosen plaintext attack secure…”
Get full text
Article -
465
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01Subjects: Get full text
Article -
466
Phasor Measurement Units Allocation Against Load Redistribution Attacks Based on Greedy Algorithm
Published 2023-09-01Subjects: “…load redistribution attacks…”
Get full text
Article -
467
THE FEATURES OF STATISTICAL CHARACTERISTICS TERRORISM ON TRANSPORT
Published 2018-02-01Subjects: Get full text
Article -
468
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01Subjects: Get full text
Article -
469
Fuzzy intrusion detection system for MANET packet dropping attack
Published 2016-10-01Subjects: Get full text
Article -
470
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01Subjects: Get full text
Article -
471
Application of Tchebichef moment in image watermarking techniques
Published 2003-01-01Subjects: Get full text
Article -
472
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01Subjects: Get full text
Article -
473
Le défi Charlie : les médias à l’épreuve des attentats
Published 2018-12-01Subjects: Get full text
Article -
474
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: Get full text
Article -
475
Enhancing Security in International Data Spaces: A STRIDE Framework Approach
Published 2024-12-01Subjects: Get full text
Article -
476
Exploring the Roles of In-Network Caching in ICN
Published 2014-03-01Subjects: Get full text
Article -
477
ECC fault attack algorithm based on Grover's quantum search algorithm with 0.1π phase rotation
Published 2017-08-01Subjects: Get full text
Article -
478
-
479
A Trajectory Prediction Method for Reentry Glide Vehicles via Adaptive Cost Function
Published 2025-01-01Subjects: Get full text
Article -
480
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01Subjects: Get full text
Article