ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Pure sciences
Biology
Architecture and Urbanism
Industrial engineer
Education
Research
Social Sciences
all records (73)

Languages
English
Spanish
German
Portuguese

Countries
Indonesia
USA
Ukraine
Brazil
Romania
Austria
Switzerland
South Africa
Russia
Pakistan
all records (74)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
30.475  Articles
1 of 3.049 pages  |  10  records  |  more records»
Context. The subject of this paper is adversarial attacks, their types, reasons for the emergence. A simplified fast and effective logistic regression attack algorithm has been presented. The work’s relevance is explained by the fact that neural network’s... see more

The changing nature of warfare has seen a paradigm shift from the conventional to asymmetric, contactless warfare such as information and cyber warfare. Excessive dependence on information and communication technologies, cloud infrastructures, big data an... see more

A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with incident response teams, se... see more

Impacts of frequency and voltage disturbance on an isolated power system caused by cyber-attack have been discussed, and a neural network-based protective approach has been proposed in this research work. Adaptive PID controllers for both load frequency c... see more

Long term evolution based fourth generation (4G) mobile technology has provided a platform for fast and efficient wireless communication. The advanced encryption standard (AES) is one of the three cryptographic algorithms used in 4G networks for encryptio... see more

Today, wireless sensor networks (WSNs) are widely used in many applications including the environment, military, and explorations. One of the most dangerous attacks against these networks is node replication. In this attack, the adversary captures a legal... see more

Nowadays, everything is within our grasp and with the mobile phones become easier. Its use is not limited to calls and SMS but has become a tool that can be used to serve business transactions, banking, academic of data through mobile applications. Tus, t... see more

Information is necessary for life because everything can not be done properly in the absence of information. The security problem is one of the most crucial aspects of a file containing sensitive information, for example, medical record files. Often, the ... see more

The path planning of anti-ship missile should be considered both cruising in safety and striking in quick, which is an intractable problem. In particular, it is difficult to consider the safety of each missile path in the path planning of multiple missile... see more

1 of 3.049 pages  |  10  records  |  more records»