„attacker“
Suchergebnisse
1.000+ Treffer
-
Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization
-
Factors for revenues and market share growth in the mobile telecommunications industry
-
A Signal Released by an Endophytic Attacker Acts as a Substrate for a Rapid Defensive Reaction of the Red Alga Chondrus crispus
-
Detecting colluding attackers in distributed grid systems
-
Modelling the dynamics of information warfare: an attacker-defender scenario using Lotka-Volterra equations
-
Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities
-
DMAFL: Effective defense against malicious attacker federated learning framework via blockchain and TFHE
-
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers
-
Context-based Access Control and Attack Modelling and Analysis
-
Context-based Access Control and Attack Modelling and Analysis
-
Securing knowledge-based authentication against online attackers
-
Datenschutz und Technikgestaltung
-
Attackers, Packets, and Puzzles: On Denial-of-Service Prevention in Local Area Networks
-
Attacker models and assumption coverage
-
Trusted Systems in Untrusted Environments: Protecting against Strong Attackers
-
Misbehavior Detection and Attacker Identification in Vehicular Ad-hoc Networks
-
Retraction Note to: Improving QoS and efficient multi-hop and relay based communication frame work against attacker in MANET
-
Attackers, Packets, and Puzzles – On Denial-of-Service Prevention in Local Area Networks
-
Simulated penetration testing and mitigation analysis
-
Context-based Access Control and Attack Modelling and Analysis