Vol. 2. No. (14) 2021
Papers
-
Application of Bayesian network in risk assessment for website deployment scenarios
Abstract views: 173 / PDF downloads: 54
-
An efficient secure sum of multi-scalar products protocol base on elliptic curve
Abstract views: 112 / PDF downloads: 99
-
Algorithm for detecting attacks on Web applications based on machine learning methods and attributes queries
Abstract views: 828 / PDF downloads: 127
-
The security of the BLT signature scheme with practical implementation issues
Abstract views: 90 / PDF downloads: 42
-
Research and development automatically generate detection rules for IDS based on machine learning technology
Abstract views: 122 / PDF downloads: 90
-
On the correlation and sensitivity of so far statistical randomness tests based on runs
Abstract views: 107 / PDF downloads: 53
-
Proposing a method to design secure digital signature scheme on the ring structure Zn
Abstract views: 93 / PDF downloads: 64
-
Applying M-sequences Decimation to Generate Interleaved Sequence
Abstract views: 93 / PDF downloads: 52