Found: 3
Select item for more details and to access through your institution.
A Malicious Program Behavior Detection Model Based on API Call Sequences.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 6, p. 1092, doi. 10.3390/electronics13061092
- By:
- Publication type:
- Article
A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 3, p. 336, doi. 10.3390/sym16030336
- By:
- Publication type:
- Article
Dynamic Real-Time Analysis of Network Attacks Based on Dynamic Risk Probability Algorithm.
- Published in:
- Journal of Advanced Computational Intelligence & Intelligent Informatics, 2024, v. 28, n. 1, p. 141, doi. 10.20965/jaciii.2024.p0141
- By:
- Publication type:
- Article