Results 291 to 300 of about 22,224 (372)
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review. [PDF]
Alotaibi B.
europepmc +1 more source
MultiNet-IDS: an ensemble of DRL and LSTM for improved intrusion detection in wireless sensor networks. [PDF]
Hussain S +6 more
europepmc +1 more source
Pioneering advanced security solutions for reinforcement learning-based adaptive key rotation in Zigbee networks. [PDF]
Fang X +6 more
europepmc +1 more source
QCAE-QOC-SVM: A hybrid quantum machine learning model for DoS and Fuzzy attack detection on autonomous vehicle CAN bus. [PDF]
R M, Ramesha SS, Mukhopadhyay A.
europepmc +1 more source
Evaluating Software Security Aspects through Fuzzing and Genetic Algorithms
Y. Zhang
openalex +1 more source
Verfeinerung der Code-Abdeckung zur besseren Darstellung der Fuzzing-Leistung [PDF]
Stephan Lipp
openalex
Vulnerability Discovery In Industrial Control Systems Using Fuzzing
Marie Louise Uwibambe
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Modern Physics Letters A, 2005
As a simple example of the "blurring" influence of noncommutative geometry, a noncommutative version of a high-frequency perturbation of a background metric is calculated. The relation between the principal null vectors of the wave and those of the induced symplectic structure is in this case particularly clear.
Burić, M., Madore, J.
openaire +2 more sources
As a simple example of the "blurring" influence of noncommutative geometry, a noncommutative version of a high-frequency perturbation of a background metric is calculated. The relation between the principal null vectors of the wave and those of the induced symplectic structure is in this case particularly clear.
Burić, M., Madore, J.
openaire +2 more sources

