Linked e-resources

Details

Encryption and Cybersecurity
A Gray-Box Vulnerability Discovery Model based on Path Coverage
Quantum Network Coding Based on Entanglement Distribution
Moving Target Defense in Preventing SQL Injection
Design and Security Analysis of Certificateless Aggregate Signature Scheme
SuperEye: a Distributed Port Scanning System
An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data
NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis
Short Text Topic Recognition and Optimization Method for University Online Community
A Survey on Network Traffic Identification
A Survey of Network Security Situational Awareness Technology
Multi-function Quantum Cryptography Protocol Based On Bell State
The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis
A Weight-Based Channel Estimation Implementation Algorithm
^Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function
BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme
Robust Analysis of Grid System Based on Complex Network Attack Mode
A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE
Research on SQL Injection and Defense Technology
A Review of the Factorization Problem of Large Integers
A Comparison of Machine Learning Algorithms for Detecting XSS Attacks
A Survey of Privacy-Preserving Techniques for Blockchain
A Survey of Software Reverse Engineering Applications
A Fast IP Matching Algorithm under Large Traffic
An Effective Load Balance using Link Bandwidth for SDN-based Data Centers
Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric
Research on Content Extraction of Rich Text Web Pages
Network Protocol Analysis base on WeChat PC Version
Bitcoin Network Size Estimation Based on Coupon Collection Model
^A Survey of the Software Vulnerability Discovery using Machine Learning Techniques
A Distributed Cryptanalysis Framework based on Mobile Phones
A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier
A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network
Fast Failover for Link Failures in Software Defined Networks
Steady-state Topology Discovery of Target Networks based on Statistics Method
A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels
Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn
DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory
Webshell Detection Model based on Deep Learning
A Security-Sensitive Function Mining Framework for Source Code
Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net
^Trusted Component Decomposition Based on OR-transition Colored Petri Net
High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range
Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning
Identify Influentials Based on User behavior Across Different Topics
Taylor Series Localization Algorithm Based on Semi-definite Programming
Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene
An evolving network model based on a triangular connecting mechanism for the Internet topology
A new quantum private query protocol with better performance in resisting joint-measurement attack
PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid
Blockchain Private Key Storage Algorithm Based on Image Information Hiding
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning

Browse Subjects

Show more subjects...

Statistics

from
to
Export