-
1
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: Get full text
Article -
2
-
3
Integrated intrusion detection design with discretion of leading agent using machine learning for efficient MANET system
Published 2025-08-01Subjects: Get full text
Article -
4
THE AUTHENTICATION PROCESS USING GRAPHICAL PASSWORDS
Published 2016-05-01Subjects: “…attacker…”
Get full text
Article -
5
Phishing schemes in the banking sector: Recommendations to Internet users on protection and development of regulatory tasks
Published 2021-12-01Subjects: Get full text
Article -
6
ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN
Published 2015-06-01Subjects: Get full text
Article -
7
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Subjects: “…source-location privacy;anonymity-quantified dynamic mix-ring;global attacker…”
Get full text
Article -
8
Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT
Published 2024-11-01Subjects: Get full text
Article -
9
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: “…Amplification attacks…”
Get full text
Article -
10
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Published 2024-11-01Subjects: Get full text
Article -
11
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01Subjects: Get full text
Article -
12
An Indian Gaur (Bos gaurus) Gores in the Western Ghats-A case report
Published 2025-08-01Subjects: “…Bos gaurus attack…”
Get full text
Article -
13
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems
Published 2024-12-01Subjects: “…lattice attack…”
Get full text
Article -
14
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: “…attack prediction;security situation;Bayesian attack graph;attack-defense;time prediction…”
Get full text
Article -
15
Enhancing SAR-ATR Systems’ Resistance to S2M Attacks via FUA: Optimizing Surrogate Models for Adversarial Example Transferability
Published 2025-01-01Subjects: “…Adversarial attack…”
Get full text
Article -
16
Light Attack: A Physical World Real-Time Attack Against Object Classifiers
Published 2025-01-01Subjects: Get full text
Article -
17
Quantitative method for network security situation based on attack prediction
Published 2017-10-01Subjects: “…attack prediction…”
Get full text
Article -
18
Neutrosophic Set and Machine Learning Model for Identifying Botnet Attacks on IoT Effectively
Published 2025-07-01Subjects: Get full text
Article -
19
Resilient Multimedia Embedding in DICOM Images: A Robustness Evaluation Under Multiple Attacks
Published 2025-01-01Subjects: Get full text
Article -
20
Time synchronization attack detection for industrial wireless network
Published 2023-06-01Subjects: Get full text
Article