No 3. CS (17) 2022
Papers
-
Efficient multiplication of a vector by a matrix MDS
Abstract views: 1662 / PDF downloads: 176
-
Proposing the application of a deep learning model to detect the malicious IP address of botnet in the computer network
Abstract views: 1011 / PDF downloads: 356
-
On some relations of SCA-related properties of S-box under the Hamming weight leakage mode
Abstract views: 775 / PDF downloads: 165
-
Automated Test Data Generation for Embedded System Models Using Combinatorial Testing
Abstract views: 777 / PDF downloads: 108
-
Extrapolated nonstandard numerical schemes for solving an epidemiological model for computer viruses
Abstract views: 858 / PDF downloads: 174
-
Initial point for enhancing DC Programming and DCA in Physical Layer Security
Abstract views: 700 / PDF downloads: 110
-
Applying reinforcement learning in automated penetration testing
Abstract views: 1140 / PDF downloads: 549
-
Approach to collaborative fuzzy clustering in large data analysis
Abstract views: 770 / PDF downloads: 138
-
A new look in the representation of AES like S-box
Abstract views: 981 / PDF downloads: 159










