|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1065 occurrences of 522 keywords
|
|
|
Results
Found 2446 publication records. Showing 2446 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Jeffrey Horton, Jennifer Seberry |
Companion Viruses and the Macintosh: Threats and Countermeasures. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Adam L. Young, Moti Yung |
Cryptovirology: Extortion-Based Security Threats and Countermeasures. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
21 | Edward G. Coffman Jr., Leonard Kleinrock |
Computer scheduling methods and their countermeasures. |
AFIPS Spring Joint Computing Conference |
1968 |
DBLP DOI BibTeX RDF |
|
19 | Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay |
Pinpointing Cache Timing Attacks on AES. |
VLSI Design |
2010 |
DBLP DOI BibTeX RDF |
AES, Side Channel Attacks, Countermeasures, Cache Attacks |
19 | Qunli Wu, Hong Zheng, Xue Tan |
The Problems of Unification and Coordination in the Development of E-Government in China. |
IFITA (3) |
2009 |
DBLP DOI BibTeX RDF |
unified planning, e-government, countermeasures |
19 | Sergio Castillo-Perez, Joaquín García-Alfaro |
Evaluation of Two Privacy-Preserving Protocols for the DNS. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Privacy Information Retrieval, Privacy, Countermeasures, Domain Name System, IT Security |
19 | Abdullah M. Alnajim, Malcolm Munro |
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
anti-Phishing countermeasures, online fraud, online banking security, Phishing, e-commerce security |
19 | Moti Yung |
How to Guard the Guards Themselves. |
FCT |
2009 |
DBLP DOI BibTeX RDF |
Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys |
19 | Jean-Sébastien Coron, Ilya Kizhvatov |
Analysis of the split mask countermeasure for embedded systems. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DPA, side channel analysis, countermeasures, masking |
19 | Maciej Nikodem |
Boundary Scan Security Enhancements for a Cryptographic Hardware. |
EUROCAST |
2009 |
DBLP DOI BibTeX RDF |
IEEE 1149, side-channel attacks, countermeasures, boundary scan |
19 | Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang |
A new method for intrusion detection on hierarchical wireless sensor networks. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
attack behaviors, wireless sensor networks, intrusion detection, anomaly detection, countermeasures |
19 | Nwokedi C. Idika, Brandeis H. Marshall, Bharat K. Bhargava |
Maximizing network security given a limited budget. |
Richard Tapia Celebration of Diversity in Computing Conference |
2009 |
DBLP DOI BibTeX RDF |
network hardening, network security, countermeasures, attack graphs, security measures |
19 | Jean-Sébastien Coron, Ilya Kizhvatov |
An Efficient Method for Random Delay Generation in Embedded Software. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
random delays, Side channel attacks, countermeasures |
19 | Catherine H. Gebotys, Brian A. White |
EM analysis of a wireless Java-based PDA. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
EM analysis, Side-channel analysis, countermeasures, power attacks |
19 | Daniel J. Bernstein, Tanja Lange 0001, Reza Rezaeian Farashahi |
Binary Edwards Curves. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Edwards curves, complete addition law, Montgomery ladder, countermeasures against side-channel attacks, Elliptic curves, binary fields |
19 | Daniel J. Bernstein, Tanja Lange 0001 |
Inverted Edwards Coordinates. |
AAECC |
2007 |
DBLP DOI BibTeX RDF |
Edwards coordinates, inverted Edwards coordinates, side-channel countermeasures, unified addition formulas, strongly unified addition formulas, Elliptic curves, addition, explicit formulas, doubling |
19 | Daniel J. Bernstein, Tanja Lange 0001 |
Faster Addition and Doubling on Elliptic Curves. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
multi-scalar multiplication, side-channel countermeasures, unified addition formulas, complete addition formulas, performance evaluation, Elliptic curves, register allocation, scalar multiplication, efficient implementation, addition, explicit formulas, doubling |
19 | David Jao, S. Ramesh Raju, Ramarathnam Venkatesan |
Digit Set Randomization in Elliptic Curve Cryptography. |
SAGA |
2007 |
DBLP DOI BibTeX RDF |
randomized representations, non-adjacent form representations, side channel attack countermeasures, elliptic curve cryptography |
19 | Sebastian Gajek, Lijun Liao, Jörg Schwenk |
Breaking and fixing the inline approach. |
SWS |
2007 |
DBLP DOI BibTeX RDF |
inline approach, wrapping attacks, countermeasures, XML signature |
19 | Dmitrij Lagutin, Hannu H. Kari |
Controlling Incoming Connections Using Certificates and Distributed Hash Tables. |
NEW2AN |
2007 |
DBLP DOI BibTeX RDF |
rights delegation, DoS countermeasures, certificates, Session management, rights management |
19 | Jerry den Hartog, Erik P. de Vink |
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
systematic hardening, simulation, side-channel attack, DPA, power analysis, smartcard, countermeasures, fault analysis |
17 | Yves Younan, Frank Piessens, Wouter Joosen |
Protecting Global and Static Variables from Buffer Overflow Attacks. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Weise 0001, Michael Zapf |
Evolving distributed algorithms with genetic programming: election. |
GEC Summit |
2009 |
DBLP DOI BibTeX RDF |
LGP, RBGP, SGP, eRBGP, extended rule-based genetic programming, fraglets, indirect memory access, positional epistasis, rule-based genetic programming, standard genetic programming, distributed systems, genetic programming, learning classifier systems, LCS, election, epistasis, linear genetic programming |
17 | Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin |
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Douglas Stebila, Berkant Ustaoglu |
Towards Denial-of-Service-Resilient Key Agreement Protocols. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Nicolás Macia, Paula Venosa, Luis Marrone |
Requirements for troubleshooting wi-fi network security through location technologies. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
signalprint, network security, monitoring, location, wifi |
17 | Paolo Maistri, Régis Leveugle |
Double-Data-Rate Computation as a Countermeasure against Fault Analysis. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
The security of the Fiat-Shamir scheme in the presence of transient hardware faults. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack |
17 | Duo Liu, Zhiyong Tan, Yiqi Dai |
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Kun Peng, Feng Bao 0001 |
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
PBD shuffling, AAAP attack, optimisation, correction |
17 | Ming Luo, Tao Peng 0002, Christopher Leckie |
CPU-based DoS attacks against SIP servers. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao |
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Krutartha Patel, Sri Parameswaran |
LOCS: a low overhead profiler-driven design flow for security of MPSoCs. |
CODES+ISSS |
2008 |
DBLP DOI BibTeX RDF |
tensilica, architecture, mpsoc, execution profile, code injection |
17 | Tanya G. Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shankar Sastry 0001 |
Testbed Implementation of a Secure Flooding Time Synchronization Protocol. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff |
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Onur Aciiçmez, Werner Schindler |
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication |
17 | Thomas Plos |
Susceptibility of UHF RFID Tags to Electromagnetic Analysis. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA) |
17 | Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger |
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation |
17 | Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia |
Enabling automated threat response through the use of a dynamic security policy. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ryuiti Koike, Naoshi Nakaya, Yuji Koi |
Development of System for the Automatic Generation of Unknown Virus Extermination Software. |
SAINT |
2007 |
DBLP DOI BibTeX RDF |
|
17 | John Krumm |
Inference Attacks on Location Tracks. |
Pervasive |
2007 |
DBLP DOI BibTeX RDF |
inference attack, privacy, location, location tracks |
17 | Yoo-Jin Baek, Ihor Vasyltsov |
How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois |
First-Order Differential Power Analysis on the Duplication Method. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
zero attack, differential power analysis, spectral analysis, Side-channel analysis |
17 | Stephen Mark Glass, Vallipuram Muthukkumarasamy |
A Study of the TKIP Cryptographic DoS Attack. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna |
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. |
CP |
2007 |
DBLP DOI BibTeX RDF |
|
17 | François Macé, François-Xavier Standaert, Jean-Jacques Quisquater |
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Stefan Tillich, Johann Großschädl |
Power Analysis Resistant AES Implementation with Instruction Set Extensions. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
embedded RISC processor, SPARC V8 architecture, SCA resistance, Advanced Encryption Standard, power analysis, instruction set extensions |
17 | Nathan S. Evans, Chris GauthierDickey, Christian Grothoff |
Routing in the Dark: Pitch Black. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran |
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks. |
DAC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis |
Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
Information Security Management Outsourcing, Organizational Culture |
17 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
17 | Catherine H. Gebotys |
A table masking countermeasure for low-energy secure embedded systems. |
IEEE Trans. Very Large Scale Integr. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Balachander Krishnamurthy, Craig E. Wills |
Cat and mouse: content delivery tradeoffs in web access. |
WWW |
2006 |
DBLP DOI BibTeX RDF |
content blocking, web registration, privacy, anonymity |
17 | Toru Akishita, Tsuyoshi Takagi |
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication |
17 | Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti |
Defense trees for economic evaluation of security investments. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Christoph Herbst, Elisabeth Oswald, Stefan Mangard |
An AES Smart Card Implementation Resistant to Power Analysis Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
DPA resistance, smart card, AES |
17 | Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli |
Assessing the Risk of an Information Infrastructure Through Security Dependencies. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
mitigation plan, ranking, risk assessment, vulnerability, countermeasure |
17 | Sam Supakkul, Lawrence Chung |
Applying a Goal-Oriented Method for Hazard Analysis: A Case Study. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Ali Abbas, Abdulmotaleb El-Saddik, Ali Miri |
A Comprehensive Approach to Designing Internet Security Taxonomy. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
17 | François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater |
Towards Security Limits in Side-Channel Attacks. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti |
Strategic Games on Defense Trees. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
Security, Game Theory, Risk Analysis |
17 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the security of fair non-repudiation protocols. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Fair non-repudiation, Security protocols, Protocol analysis, Protocol design |
17 | Takamichi Saito |
Anti-SPAM System: Another Way of Preventing SPAM. |
DEXA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Abhinav Sarje, Deependra Choudhari, Shravan K. Rayanchu |
A Route Secure Parallel Dispatch Model for Mobile Agents Security. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung |
A DPA Countermeasure by Randomized Frobenius Decomposition. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Tanja Lange 0001, Pradeep Kumar Mishra |
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Catherine H. Gebotys, C. C. Tiu, X. Chen |
A Countermeasure for EM Attack of a Wireless PDA. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Brian Whitworth, Elizabeth Whitworth |
Spam and the Social-Technical Gap. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Shelby Evans, David V. Heinbuch, Elizabeth Kyule, John Piorkowski, James Wallner |
Risk-based Systems Security Engineering: Stopping Attacks with Intention. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Mordor, attack intentions, threat assessment, profiles, security systems |
17 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
17 | Catherine H. Gebotys |
Low energy security optimization in embedded cryptographic systems. |
CODES+ISSS |
2004 |
DBLP DOI BibTeX RDF |
embedded, smart cards, power analysis, countermeasure |
17 | Pieter Spronck, Ida G. Sprinkhuizen-Kuyper, Eric O. Postma |
Enhancing the Performance of Dynamic Scripting in Computer Games. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Susumu Konno, Yukio Iwaya, Toru Abe, Tetsuo Kinoshita |
Design of Network Management Support System based on Active Information Resource. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
17 | Nevine Maurice Ebeid, M. Anwar Hasan |
On Randomizing Private Keys to Counteract DPA Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
binary signed-digit representation, smart cards, Differential power analysis, elliptic curve cryptosystems, scalar multiplication |
17 | Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone |
Validation of Elliptic Curve Public Keys. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the Security of Fair Non-repudiation Protocols. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Mehdi-Laurent Akkar, Louis Goubin |
A Generic Protection against High-Order Differential Power Analysis. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
High-Order DPA, Smart-cards, Power analysis, DES |
17 | Siddika Berna Örs, Elisabeth Oswald, Bart Preneel |
Power-Analysis Attacks on an FPGA - First Experimental Results. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Stephen D. Wolthusen |
Goalkeeper: Close-In Interface Protection. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Robyn R. Lutz |
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. |
Requir. Eng. |
2002 |
DBLP DOI BibTeX RDF |
Software fault tree, Mobile agents, Intrusion detection system, Requirements analysis, Coloured Petri nets |
17 | Karl Brincat, Chris J. Mitchell |
New CBC-MAC Forgery Attacks. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
17 | Bengt Carlsson, Rune Gustavsson |
Arms Race within Information Ecosystems. |
CIA |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Elisabeth Oswald, Manfred Josef Aigner |
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystems, Power Analysis |
17 | Thomas S. Messerges |
Securing the AES Finalists Against Power Analysis Attacks. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Ahlem Hamdi, Lamia Fourati, Samiha Ayed |
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao 0005, Zung Le |
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. |
Cryptogr. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jueshuai Wang |
Spillover effects of liquidity management in major economies and China's digital economy-driven countermeasures. |
Kybernetes |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yue Wang 0051, Fuping Sun, Xian Wang |
Defensive Performance Evaluation Methods of the GNSS for Satellite Navigation Countermeasures. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Nimra Tabish, Chaur-Luh Tsai |
Maritime Autonomous Surface Ships: A Review of Cybersecurity Challenges, Countermeasures, and Future Perspectives. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | David Cemernek, Shafaq Siddiqi, Roman Kern |
Effects of Class Imbalance Countermeasures on Interpretability. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Lip Yee Por, Ian Ouii Ng, Yen-Lin Chen, Jing Yang, Chin Soon Ku |
A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Koh Watanabe, Ryota Sakai, Satoshi Tanaka, Makoto Nagata, Hideki Osaka, Atsushi Nakamura, Ifong Wu, Yasushi Matsumoto, Kaoru Gotoh |
Electromagnetic Interference With the Mobile Communication Devices in Unmanned Aerial Vehicles and Its Countermeasures. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Pooja Ahuja, Preeti Sethi, Naresh Chauhan |
A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yiwen Ma, Ruohan Cao, Hui Gao 0001, Yueming Lu |
Physical-Layer Attack Detection and Countermeasures for RIS-Assisted MIMO Systems. |
IEEE Wirel. Commun. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Saman Iftikhar |
Cyberterrorism as a global threat: a review on repercussions and countermeasures. |
PeerJ Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Kuan-Chu Lu, I-Hsien Liu, Keng-Hao Chang, Jung-Shian Li |
VoWi-Fi security threats: Address resolution protocol attack and countermeasures. |
IET Networks |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fuyi Qu, Nachuan Yang, Jun Fu 0001, Hao Liu 0012, Yuzhe Li |
Stealthy Attack on Remote Control System With Local Controller and Its Countermeasures. |
IEEE Trans. Syst. Man Cybern. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 2446 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|