Results 81 to 90 of about 587,598 (211)

Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN

open access: yesDianxin kexue, 2013
As the important means of network security, intrusion detection and prevention technology have seen some preliminary applications in the traditional wired network environment.
Guanlin Chen, Zebing Wang, Yong Zhang
doaj   +2 more sources

Web Application DDoS Attack Defense Using Access Correlation [PDF]

open access: bronze, 2021
Nguyen Nghia Huynh Thi   +2 more
openalex   +1 more source

Investigation of real-gas and viscous effects on the aerodynamic characteristics of a 40 deg half-cone with suggested correlations for the shuttle orbiter [PDF]

open access: yes
Parameters were evaluated that might be used to correlate shuttle orbiter aerodynamic data to be used in extrapolating from wind-tunnel to flight conditions.
Hunt, J. L., Jones, R. A., Woods, W. C.
core   +1 more source

Fast Correlation Attacks: Methods and Countermeasures [PDF]

open access: yes, 2011
Fast correlation attacks have considerably evolved since their first appearance. They have lead to new design criteria of stream ciphers, and have found applications in other areas of communications and cryptography. In this paper, a review of the development of fast correlation attacks and their implications on the design of stream ciphers over the
openaire   +1 more source

State level correlations between high heart attack and stroke symptomology knowledge scores and CVD risk factors and mortality rates

open access: diamond, 2013
Mary Nawal Lutfiyya   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy