Found: 26
Select item for more details and to access through your institution.
Efficient SFC Protection Method against Network Attack Risks in Air Traffic Information Networks.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 13, p. 2664, doi. 10.3390/electronics13132664
- By:
- Publication type:
- Article
Coordinated cyber‐physical attacks considering DoS attacks in power systems.
- Published in:
- International Journal of Robust & Nonlinear Control, 2020, v. 30, n. 11, p. 4345, doi. 10.1002/rnc.4801
- By:
- Publication type:
- Article
Virtual Network Embedding Based on Topology Potential.
- Published in:
- Entropy, 2018, v. 20, n. 12, p. 941, doi. 10.3390/e20120941
- By:
- Publication type:
- Article
Physical Layer Security Technology Based on Nonorthogonal Multiple Access Communication.
- Published in:
- Mobile Information Systems, 2022, p. 1, doi. 10.1155/2022/6303210
- By:
- Publication type:
- Article
Coherence optimised subarray partition for hybrid MIMO phased array radar.
- Published in:
- IET Microwaves, Antennas & Propagation (Wiley-Blackwell), 2021, v. 15, n. 11, p. 1441, doi. 10.1049/mia2.12128
- By:
- Publication type:
- Article
TCFLTformer: TextCNN-Flat-Lattice Transformer for Entity Recognition of Air Traffic Management Cyber Threat Knowledge Graphs.
- Published in:
- Aerospace (MDPI Publishing), 2023, v. 10, n. 8, p. 697, doi. 10.3390/aerospace10080697
- By:
- Publication type:
- Article
Design of Wideband Multifunction Antenna Array Based on Multiple Interleaved Subarrays.
- Published in:
- International Journal of Antennas & Propagation, 2016, p. 1, doi. 10.1155/2016/1320726
- By:
- Publication type:
- Article
Sonar Objective Detection Based on Dilated Separable Densely Connected CNNs and Quantum-Behaved PSO Algorithm.
- Published in:
- Computational Intelligence & Neuroscience, 2021, p. 1, doi. 10.1155/2021/6235319
- By:
- Publication type:
- Article
P2P Botnet Detection Based on Nodes Correlation by the Mahalanobis Distance.
- Published in:
- Information (2078-2489), 2019, v. 10, n. 5, p. 160, doi. 10.3390/info10050160
- By:
- Publication type:
- Article
A Feature Extraction Method for P2P Botnet Detection Using Graphic Symmetry Concept.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 3, p. 326, doi. 10.3390/sym11030326
- By:
- Publication type:
- Article
DBI-Attack:Dynamic Bi-Level Integrated Attack for Intensive Multi-Scale UAV Object Detection.
- Published in:
- Remote Sensing, 2024, v. 16, n. 14, p. 2570, doi. 10.3390/rs16142570
- By:
- Publication type:
- Article
Defending against Poisoning Attacks in Aerial Image Semantic Segmentation with Robust Invariant Feature Enhancement.
- Published in:
- Remote Sensing, 2023, v. 15, n. 12, p. 3157, doi. 10.3390/rs15123157
- By:
- Publication type:
- Article
Robust Feature-Guided Generative Adversarial Network for Aerial Image Semantic Segmentation against Backdoor Attacks.
- Published in:
- Remote Sensing, 2023, v. 15, n. 10, p. 2580, doi. 10.3390/rs15102580
- By:
- Publication type:
- Article
Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction.
- Published in:
- Remote Sensing, 2023, v. 15, n. 6, p. 1690, doi. 10.3390/rs15061690
- By:
- Publication type:
- Article
Global Feature Attention Network: Addressing the Threat of Adversarial Attack for Aerial Image Semantic Segmentation.
- Published in:
- Remote Sensing, 2023, v. 15, n. 5, p. 1325, doi. 10.3390/rs15051325
- By:
- Publication type:
- Article
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8936784
- By:
- Publication type:
- Article
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8045909
- By:
- Publication type:
- Article
Secure SWIPT-powered UAV communication against full-duplex active eavesdropper.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 6, p. 2495, doi. 10.1007/s11276-023-03318-4
- By:
- Publication type:
- Article
Secure Transmission of mmWave NOMA UAV-Assisted Relay System against Randomly Located Eavesdroppers.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7452014
- By:
- Publication type:
- Article
Thinned Virtual Array for Cramer Rao Bound Optimization in MIMO Radar.
- Published in:
- International Journal of Antennas & Propagation, 2021, p. 1, doi. 10.1155/2021/1408498
- By:
- Publication type:
- Article
A Cascading Failure Model of the Air Traffic Control Network Based on the Theory of Interdependent Networks.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 10, p. 6256, doi. 10.3390/app13106256
- By:
- Publication type:
- Article
Adversarial attack and defense methods for neural network based state estimation in smart grid.
- Published in:
- IET Renewable Power Generation (Wiley-Blackwell), 2022, v. 16, n. 16, p. 3507, doi. 10.1049/rpg2.12334
- By:
- Publication type:
- Article
Enhanced Graph Neural Network with Multi-Task Learning and Data Augmentation for Semi-Supervised Node Classification.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2023, v. 37, n. 12, p. 1, doi. 10.1142/S0218001423510084
- By:
- Publication type:
- Article
An algorithm for fragment-aware virtual network reconfiguration.
- Published in:
- PLoS ONE, 2018, v. 13, n. 11, p. 1, doi. 10.1371/journal.pone.0207705
- By:
- Publication type:
- Article
Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 11, p. 3584, doi. 10.3390/s24113584
- By:
- Publication type:
- Article
Threat model and construction strategy on ADS‐B attack data.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 5, p. 542, doi. 10.1049/iet-ifs.2018.5635
- By:
- Publication type:
- Article