Search alternatives:
attacker technical » attackers technical, attacks technical, attacker techniques
attack technical » attacks technical, stack technical, track technical

1
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks...

2
Published 2020
Springer International Publishing
Table of Contents: ... -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying PayWord on Ethereum -- SoK: Development...

3
Published 2007
Springer London
Table of Contents: ...Best Technical Paper -- Combining Task Execution and Background Knowledge for the Verification...

4
Published 2022
Springer Nature Singapore
Table of Contents: ... Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search...

5
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Data Mining Using Enriched Random Forests from Textual Resources and Technical Indicators...

6
Published 2016
Springer India
Table of Contents: ... Patterns -- Chapter 40. A Technical Review on LVRT of DFIG Systems -- Chapter 41. An AIS Based Approach...

7
Published 2016
Springer India
Table of Contents: ... -- Chapter 63. Malicious File Hash Detection and Drive-by Download Attacks -- Chapter 64. Parameter...

8
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...

9
Published 2014
Springer International Publishing
Table of Contents: ... Clustering of Features Approach -- A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic...

10
Published 2013
Springer New York
Table of Contents: ...-operative Black Hole Attack in MANET -- IP Address Management in Virtualized Cloud Environments -- A Fuzzy C...

11
Published 2016
Springer India
Table of Contents: ... Words -- Chapter 73. Retinal Abnormality Risk Prediction Model: A Hybrid Approach Based on Vessel...