Results 221 to 230 of about 897,349 (250)
Some of the next articles are maybe not open access.
Active Flow Control of a High-Speed Train Wake Using Synthetic Jets
Flow Turbulence and Combustion, 2023Chunjun Chen, Dongwei Wang
semanticscholar +1 more source
Obfuscator-LLVM -- Software Protection for the Masses
2015 IEEE/ACM 1st International Workshop on Software Protection, 2015P. Junod +3 more
semanticscholar +1 more source
International Journal of Heat and Fluid Flow, 2022
Bing-zheng Han, Weixi Huang, Chunxiao Xu
semanticscholar +1 more source
Bing-zheng Han, Weixi Huang, Chunxiao Xu
semanticscholar +1 more source
Resource management of switches and Controller during saturation time to avoid DDoS in SDN
IEEE International Conference on Engineering and Technology, 2016Amir Shoeb, T. Chithralekha
semanticscholar +1 more source
International Conference on Detection of intrusions and malware, and vulnerability assessment, 2005
Jedidiah R. Crandall, S. F. Wu, F. Chong
semanticscholar +1 more source
Jedidiah R. Crandall, S. F. Wu, F. Chong
semanticscholar +1 more source
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
IEEE International Conference on Communications, 2007Xu Su, R. Boppana
semanticscholar +1 more source
ByteWise: A case study in neural network obfuscation identification
Computing and Communication Workshop and Conference, 2018Luke Jones +3 more
semanticscholar +1 more source
Playing hide-and-seek with the tobacco industry.
Nicotine & Tobacco Research, 2005E. LeGresley, M. Muggli, R. Hurt
semanticscholar +1 more source
Mitigation of colluding route falsification attacks by insider nodes in mobile ad hoc networks
Wireless Communications and Mobile Computing, 2009Xu Su, R. Boppana
semanticscholar +1 more source

