Symptoms-Based Network Intrusion Detection System. | 0 | 0.34 | 2021 |
Impact Analysis and Correlation Study on the Spread of Fake News During Pandemic COVID-19 in Malaysia. | 0 | 0.34 | 2021 |
Assessing The Cyber-Security Of The Iec 60870-5-104 Protocol In Scada System | 0 | 0.34 | 2020 |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices - Existing Approaches, Limitations and Future Direction. | 0 | 0.34 | 2020 |
Compromising the Data Integrity of an Electrical Power Grid SCADA System. | 0 | 0.34 | 2020 |
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations | 0 | 0.34 | 2019 |
A Review Of Security Assessment Methodologies In Industrial Control Systems | 0 | 0.34 | 2019 |
Towards Implementing Scalable And Reconfigurable Scada Security Testbed In Power System Environment | 0 | 0.34 | 2019 |
An Improved Indoor Location Technique Using Combination of Kalman Filter and Centroid Positioning. | 0 | 0.34 | 2019 |
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance. | 1 | 0.36 | 2016 |
S-box construction from non-permutation power functions | 3 | 0.40 | 2013 |
STITCH-256: A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION. | 0 | 0.34 | 2012 |