-
1
Password Cracking Methods and Techniques in Computer Forensic Investigation
Published 2021-06-01Subjects: Get full text
Article -
2
Improving the Routing Security in Wireless Sensor Networks using Neutrosophic Set and Machine Learning Models
Published 2025-07-01Subjects: Get full text
Article -
3
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: Get full text
Article -
4
Navigating Legal Implications: The Impact of Enhanced Smartphone Integration on Security in Organizational Networks
Published 2023-08-01Subjects: “…compliance regulations, information technology (it), network security, attacks, security concerns, telecommunication…”
Get full text
Article -
5
GBiL: A hybrid gated recurrent units (GRU) and bidirectional long short-term memory (BiLSTM) model with Particle Swarm Optimization for a Robust VANET IDS
Published 2025-07-01Subjects: “…Security attacks…”
Get full text
Article -
6
Pseudo-Random Identification and Efficient Privacy-Preserving V2X Communication for IoV Networks
Published 2025-01-01Subjects: Get full text
Article -
7
Research on LEO Satellite Network Routing Security
Published 2023-06-01Subjects: Get full text
Article -
8
Explainable AI for zero-day attack detection in IoT networks using attention fusion model
Published 2025-07-01Subjects: “…Security attack…”
Get full text
Article -
9
Attack scenarios reasoning,hypothesizing and predicting based on capability transition model
Published 2007-01-01Subjects: “…Internet security;attack scenario;capability transition model;intrusion detection…”
Get full text
Article -
10
Beamforming for the Cooperative Non-Orthogonal Multiple Access Transmission with Full-Duplex Relaying with Application to Security Attack
Published 2025-02-01Subjects: Get full text
Article