Search alternatives:
technical paper » technical papers
word attack » world attack, work attack, world attacks

1
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Worm Detection and Containment (I) -- Virtual Playgrounds for Worm Behavior Investigation...

2
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...

3
Published 2020
Springer International Publishing
Table of Contents: ... -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying PayWord on Ethereum -- SoK: Development...

4
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks...

5
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing...

6
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Comb Method for Elliptic Curve Point Multiplication -- Diophantine Approximation Attack on a Fast...

7
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice -- On the Integration of Public...

8
Published 2007
Springer London
Table of Contents: ...Best Technical Paper -- Combining Task Execution and Background Knowledge for the Verification...

9
Published 2020
Springer International Publishing
Table of Contents: ... of Data in IoT Networks: A Technical Research Report -- B Efficient Thermography Guided Learning...

10
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers...

11
Published 2022
Springer Nature Singapore
Table of Contents: ... Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search...

12
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Data Mining Using Enriched Random Forests from Textual Resources and Technical Indicators...

13
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Algorithms for Wireless Sensor Networks -- Detection and Mitigation of Attacks by Colluding Misbehaving Nodes...

14
Published 2016
Springer India
Table of Contents: ... Patterns -- Chapter 40. A Technical Review on LVRT of DFIG Systems -- Chapter 41. An AIS Based Approach...

15
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...

16
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...

17
Published 2016
Springer India
Table of Contents: ... -- Chapter 63. Malicious File Hash Detection and Drive-by Download Attacks -- Chapter 64. Parameter...

18
Published 2013
Springer New York
Table of Contents: ...-operative Black Hole Attack in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...

19
Published 2016
Springer India
Table of Contents: ... Words -- Chapter 73. Retinal Abnormality Risk Prediction Model: A Hybrid Approach Based on Vessel...