Malicious Attacks
Security to wireless sensor networks against malicious attacks using Hamming residue method
7
Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks
7
Modelling based approach for reconstructing evidence of VoIP malicious attacks
18
Survey of Malicious Attacks in MANET
5
COMMON TYPES OF MALICIOUS ATTACKS FOR WEB USERS
7
Secure Data Transmission from Malicious Attacks: A Review
5
Architecture of Host Based Intrusion Detection System For Detecting Malicious Attacks
7
Architecture of Host Based Intrusion Detection System for Detecting Malicious Attacks
7
Protecting web content integrity from malicious attacks
5
A Malicious Attacks and Defense Techniques on Android Based Smartphone Platform
9
Are blockchains immune to all malicious attacks?
9
Deducing Malicious Attacks in Disruption Tolerant Networks
6
Detecting Malicious Attacks in Facebook Applications
7
Survey of Detection and Localization of Multiple Spoofing Attacks in Wireless Networks
5
An effective fault tolerance method for collaborative editing with fickle operations
8
A Survey and Comparative Analysis on Video Watermarking
7
An approach for defending against collaborative attacks by malicious nodes in MANETs
9
Prevention of Collaborative Attacks of Malicious Node in MANET Using CBDA Scheme
6
SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE
6
Attack data analysis to find Cross Site Scripting attack patterns
8