Digital Library


Search: "[ keyword: Attacks ]" (6)

  1. Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  2. A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks

  3. Two-Phase Security Protection for the Internet of Things Object

  4. Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map

  5. A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm

  6. The Wormhole Routing Attack in Wireless Sensor Networks (WSN)