No 2. CS (14) 2021
Papers
-
Application of Bayesian network in risk assessment for website deployment scenarios
Abstract views: 830 / PDF downloads: 128
-
An efficient secure sum of multi-scalar products protocol base on elliptic curve
Abstract views: 1127 / PDF downloads: 130
-
Algorithm for detecting attacks on Web applications based on machine learning methods and attributes queries
Abstract views: 1905 / PDF downloads: 372
-
The security of the BLT signature scheme with practical implementation issues
Abstract views: 813 / PDF downloads: 128
-
Research and development automatically generate detection rules for IDS based on machine learning technology
Abstract views: 750 / PDF downloads: 269
-
On the correlation and sensitivity of so far statistical randomness tests based on runs
Abstract views: 980 / PDF downloads: 161
-
Proposing a method to design secure digital signature scheme on the ring structure Zn
Abstract views: 660 / PDF downloads: 201
-
Applying M-sequences Decimation to Generate Interleaved Sequence
Abstract views: 644 / PDF downloads: 167










