Search

Showing total 50 results

Search Constraints

Start Over You searched for: Topic algorithms Remove constraint Topic: algorithms Topic security systems Remove constraint Topic: security systems Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Database Academic Search Index Remove constraint Database: Academic Search Index
50 results

Search Results

1. Accelerated Stochastic Variance Reduction Gradient Algorithms for Robust Subspace Clustering.

2. Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning.

3. An enhanced LED cipher algorithm performance for data security in IoT systems.

4. Dynamic Real-Time Analysis of Network Attacks Based on Dynamic Risk Probability Algorithm.

5. 基于加法同态的可修改区块链方案.

6. 基于节点分组信誉模型的改进 PBFT 共识算法.

7. An improved PBFT consensus algorithm based on grouping and credit grading.

8. Research on campus network security protection system framework based on cloud data and intrusion detection algorithm.

9. New Energy Power System Static Security and Stability Region Calculation Research Based on IPSO-RLS Hybrid Algorithm.

10. Development of a Model for Spoofing Attacks in Internet of Things.

11. Secure Vertical Handoff in Mobile Wireless Network Based on Secure Location Algorithm.

12. Bit‐level image encryption algorithm based on fully‐connected‐like network and random modification of edge pixels.

13. Research on PBFT consensus algorithm for grouping based on feature trust.

14. Propuestas de mejora DES y Triple DES a lo largo de su historia.

15. 基于多样性的微服务韧性部署机制.

16. Mitigation of Saturated Cut-Sets During Multiple Outages to Enhance Power System Security.

17. K maximum probability attack paths generation algorithm for target nodes in networked systems.

18. Persistent Stochastic Non-Interference.

19. Hybrid encryption algorithm (HEA) based on chaotic system.

20. Distributed secure estimation for cyber-physical systems with fading measurements and false data injection attacks.

21. Network Security Situation Assessment Model Based on Extended Hidden Markov.

22. 一种基于超混沌系统的双图关联加密算法.

23. Energy-Constrained UAV-Assisted Secure Communications With Position Optimization and Cooperative Jamming.

24. Optimization of Transmission System Security Margin under (N-1) Line Contingency Using Improved PSO Algorithm.

25. Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.

26. ALGORITHMS OF MANAGEMENT OF FULL-SCALE ORGANISATION PROTECTION.

27. Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm.

28. Research on early warning and monitoring algorithm of financial crisis based on fuzzy cognitive map.

29. Small target flame detection algorithm based on improved YOLOv7.

30. A novel verification method for payment card systems.

31. A hierarchical detection method in external communication for self-driving vehicles based on TDMA.

32. Application of a secure data transmission with an effective timing algorithm based on LoRa modulation and chaos.

33. Optimal bidding strategy for generation companies under CVaR constraint.

34. Adversarial patrolling with spatially uncertain alarm signals.

35. A heat diffusion model based algorithm for personalized influence maximization in social network.

36. Improved User Position Monitor for WAAS.

37. A formal modeling and analysis approach for access control rules, policies, and their combinations.

38. An evidence-based model of saliency feature extraction for scene text analysis.

39. Critical Flight Conditions at High Angles of Attack, Related to Loss of Control in Lateral Motion.

40. Finger Vein Recognition Using Optimal Partitioning Uniform Rotation Invariant LBP Descriptor.

41. Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network.

42. Impact Metrics of Security Vulnerabilities: Analysis and Weighing.

43. Locally-Referenced Ultrasonic -- LPS for Localization and Navigation.

44. Real-time task scheduling and network device security for complex embedded systems based on deep learning networks.

45. Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures.

46. S-Box Design Based on 2D Multiple Collapse Chaotic Map and Their Application in Image Encryption.

47. Integrated encryption in dynamic arithmetic compression.

48. Method to Increase Dependability in a Cloud-Fog-Edge Environment.

49. Hybrid fuzzy evaluation algorithm for power system protection security assessment.

50. Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.