under Attack
Implementation of Pattern Classifiers under Attack Using Security Evaluation
5
Protection Assessment of Design Classifiers under Attack
7
Analysis on Security Evaluation of Pattern Classifiers under Attack
7
Grand Jury Under Attack, The Part III
13
A Survey on: Security Evaluation of Pattern Classifiers under Attack
5
Identifying Security Evaluation of Pattern Classifiers Under attack
6
The presumption of innocence under attack
47
Grand Jury Under Attack, The Part I
25
Security Evaluation of Pattern Classifiers under Attack
6
Sinkhole Attack Detection and Prevention in WSN & Improving the Performance of AODV Protocol
10
Chapter VII (General Conclusions and Appraisal: Policy and Law)
23
“You’re either with us, or you are with the terrorists” – Juxtaposed Ideologies in the War on Terror
13
Security Management for Wireless Sensor Network under Eavesdropper Attack
8
Secure AODV Simulation under Black hole Attack in MANET
5
A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs
5
Mixing-attack-proof Randomized Embedding Audio Watermarking System
8
Transcript secure signatures based on modular lattices
21
Security weakness in the Proof of Storage with Deduplication
11
7. TO PROPOSE A FRAMEWORK – IDPS FOR A MANET UNDER FLOODING ATTACK
11
Attack Resistant Multimedia Data Sharing under Distributed Networks
5