What the Editors-in-Chief say about the review process in our Journals: Our Editors-in-Chief declare, confirm, certify and sign the substantial, important, line by line peer review process and our high-rejection rates.
Published Articles with Keyword: Attacks
- Title: Sequentially Triggering “Time-Bomb” Trojan into Hardware Wired Microsequencer
Authors: Grigore Mihai Timis, Alexandru Valachi
Doi: 10.37394/232027.2024.6.10
Download | Download
Published in International Journal of Electrical Engineering and Computer Science, Volume 6, 2024 - Title: A Blockchain-based Security Architecture for the Internet of Things
Authors: Kelechi G. Eze, Cajetan M. Akujuobi, Shermar Hunter, Shumon Alam, Sarhan Musa, Justin Foreman
Doi: 10.37394/23209.2022.19.2
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 19, 2022 - Title: A New Technique to Improve the 2-N-PSK Method for Detecting Wireless Pilot Contamination Attacks
Authors: Dimitriya Mihaylova, Zlatka Valkova-Jarvis, Georgi Iliev
Download | Download
Published in WSEAS Transactions on Communications, Volume 16, 2017 - Title: Efficiently Secure ECC Scalar Multiplication Methods Against Power Analysis Attacks on Resource Constrained Devices
Authors: Turki F. Alsomani, Hilal Houssain
Download | Download
Published in WSEAS Transactions on Computers, Volume 14, 2017 - Title: Simulation-Based Study of Distributed Denial of Service Attacks Counteract in the Cloud Services
Authors: Wael Alosaimi, Mazin Alshamrani, Khalid Al-Begain
Download | Download
Published in WSEAS Transactions on Computer Research, Volume 4, 2016 - Title: The Analysis of Influence on Sensing Performance from the Malicious User for SSDF Attacks in Cognitive Radio
Authors: Hong Du, Shuang Fu, Jie Xu
Download | Download
Published in WSEAS Transactions on Communications, Volume 14, 2015 - Title: Detecting DRDoS Attack by Log File Based IP Pairing Mechanism
Authors: P. Mohana Priya, V. Akilandeswari, S. Mercy Shalinie
Download | Download
Published in WSEAS Transactions on Computers, Volume 13, 2014 - Title: Elliptic Curve Cryptoprocessor with Hierarchical Security
Authors: Alaaeldin Amin, Turki F. Al-Somani
Download | Download
Published in WSEAS Transactions on Circuits and Systems, Volume 13, 2014 - Title: Trustworthy Position Based Routing to Mitigate against the Malicious Attacks to Signifies Secured Data Packet using Geographic Routing Protocol in MANET
Authors: Sudhakar Sengan, S. Chenthur Pandian
Download | Download
Published in WSEAS Transactions on Communications, Volume 12, 2013 - Title: A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks
Authors: Ali E. El-Desoky, Marwa F. Aread, Magdy M. Fadel
Download | Download
Published in WSEAS Transactions on Computers, Volume 11, 2012 - Title: Secure Communication Method Using Invitation Process in Mobile Ad Hoc Networks
Authors: Masao Tanabe, Masaki Aida
Download | Download
Published in WSEAS Transactions on Communications, Volume 11, 2012