Vol. 2. No. (14) 2021
Papers
-
Application of Bayesian network in risk assessment for website deployment scenarios
Abstract views: 120 / PDF downloads: 35
-
An efficient secure sum of multi-scalar products protocol base on elliptic curve
Abstract views: 81 / PDF downloads: 72
-
Algorithm for detecting attacks on Web applications based on machine learning methods and attributes queries
Abstract views: 581 / PDF downloads: 79
-
The security of the BLT signature scheme with practical implementation issues
Abstract views: 56 / PDF downloads: 26
-
Research and development automatically generate detection rules for IDS based on machine learning technology
Abstract views: 81 / PDF downloads: 44
-
On the correlation and sensitivity of so far statistical randomness tests based on runs
Abstract views: 69 / PDF downloads: 29
-
Proposing a method to design secure digital signature scheme on the ring structure Zn
Abstract views: 71 / PDF downloads: 49
-
Applying M-sequences Decimation to Generate Interleaved Sequence
Abstract views: 68 / PDF downloads: 31