Search Result "noise attack"
Patents in Power Analysis Attacks and their Countermeasures for Cryptographic Devices
Journal: Recent Patents on Electrical Engineering
Volume: 3 Issue: 3 Year: 2010 Page: 177-185
Author(s): Radu Muresan
Power Analysis Attacks and Hardware Level Countermeasures for Cryptographic Devices
Journal: Recent Patents on Electrical & Electronic Engineering
Volume: 5 Issue: 3 Year: 2012 Page: 173-184
Author(s): Radu Muresan
New Age Attacks on Smart Homes and CyberPhysical Systems
Ebook: Smart Home and Industrial IoT Devices: Critical Perspectives on Cyberthreats, Frameworks and Protocols
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815256710124010003
Black Hole Attack Detection in Healthcare Wireless Sensor Networks Using Independent Component Analysis Machine Learning Technique
Journal: Current Signal Transduction Therapy
Volume: 15 Issue: 1 Year: 2020 Page: 56-64
Author(s): A. John Clement Sunder,A. Shanmugam
Key Independent Image Deciphering using Neighbourhood Similarity Characteristics and Divide-and-conquer Attack
Journal: Recent Patents on Engineering
Volume: 15 Issue: 4 Year: 2021 Page: 6-16
Author(s): Ram Ratan,Arvind Yadav
Smart Wireless Sensor Network to Detect and Protect Sheep and Goats to Wolf Attacks
Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 2 Issue: 2 Year: 2013 Page: 91-101
Author(s): Sandra Sendra,Ferran Llario,Lorena Parra,Jaime Lloret
A DCT Fractional Bit Replacement Based Dual Watermarking Algorithmfor Image Authentication
Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2899-2919
Author(s): Rahul Dixit,Amita Nandal,Arvind Dhaka,Yohan Varghese Kuriakose,Vardan Agarwal
An Asymmetric Optical Cryptosystem of Double Image Encryption Based on Optical Vortex Phase Mask Using Gyrator Transform Domain
Journal: Recent Advances in Computer Science and Communications
Volume: 13 Issue: 4 Year: 2020 Page: 672-685
Author(s): Hukum Singh,Mehak Khurana
Comprehensive Performance Analysis of Soft Data Fusion Schemes underSSDF Attacks in Cognitive Radio Networks
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 12 Issue: 4 Year: 2022 Page: 312-318
Author(s):
LWT-DCT based Image Watermarking Scheme using Normalized SVD
Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 9 Year: 2021 Page: 2976-2991
Author(s): Rahul Dixit,Amita Nandal,Arvind Dhaka,Vardan Agarwal,Yohan Varghese Kuriakose