ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Vulnerability analysis and improvement of RFID grouping-proof protocols
Advances in Future Manufacturing Engineering
◽
10.1201/b18474-71
◽
2015
◽
pp. 359-362
Keyword(s):
Vulnerability Analysis
◽
Grouping Proof
Download Full-text
Related Documents
Cited By
References
The Structural Vulnerability Analysis of Power Grids Based on Second-Order Centrality
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.e100.a.1567
◽
2017
◽
Vol E100.A
(7)
◽
pp. 1567-1570
◽
Cited By ~ 1
Author(s):
Zhong-Jian KANG
◽
Yi-Jia ZHANG
◽
Xin-Ling GUO
◽
Zhe-Ming LU
Keyword(s):
Vulnerability Analysis
◽
Second Order
◽
Power Grids
◽
Structural Vulnerability
Download Full-text
Information technology. RFID threat and vulnerability analysis
10.3403/30287850u
◽
2015
◽
Keyword(s):
Information Technology
◽
Vulnerability Analysis
Download Full-text
Information technology. RFID threat and vulnerability analysis
10.3403/30287850
◽
2014
◽
Keyword(s):
Information Technology
◽
Vulnerability Analysis
Download Full-text
Literature survey of deep learning-based vulnerability analysis on source code
IET Software
◽
10.1049/iet-sen.2020.0084
◽
2020
◽
Vol 14
(6)
◽
pp. 654-664
Author(s):
Abubakar Omari Abdallah Semasaba
◽
Wei Zheng
◽
Xiaoxue Wu
◽
Samuel Akwasi Agyemang
Keyword(s):
Deep Learning
◽
Source Code
◽
Vulnerability Analysis
◽
Literature Survey
Download Full-text
Vulnerability Analysis of Instructions for SDC-Causing Error Detection
IEEE Access
◽
10.1109/access.2019.2950598
◽
2019
◽
Vol 7
◽
pp. 168885-168898
Author(s):
Jingjing Gu
◽
Weining Zheng
◽
Yi Zhuang
◽
Qianwen Zhang
Keyword(s):
Error Detection
◽
Vulnerability Analysis
Download Full-text
Vulnerability Analysis for Network Connectivity: A Prioritizing Critical Area Approach
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
◽
10.1109/globecom42002.2020.9348276
◽
2020
◽
Author(s):
Shumei Liu
◽
Yao Yu
◽
Lei Guo
◽
Phee Lep Yeoh
◽
Branka Vucetic
◽
...
Keyword(s):
Network Connectivity
◽
Vulnerability Analysis
◽
Critical Area
Download Full-text
Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on Xen.
2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
◽
10.1109/issrew51248.2020.00078
◽
2020
◽
Author(s):
Charles F. Goncalves
◽
Nuno Antunes
Keyword(s):
Vulnerability Analysis
Download Full-text
Seismic vulnerability analysis in Poso Distric
Journal of Physics Conference Series
◽
10.1088/1742-6596/1763/1/012015
◽
2021
◽
Vol 1763
(1)
◽
pp. 012015
Author(s):
M Rusydi
◽
M B Cyio
◽
Rahmawati
◽
Ramlan
Keyword(s):
Seismic Vulnerability
◽
Vulnerability Analysis
◽
Seismic Vulnerability Analysis
Download Full-text
Vulnerability Analysis of Cyber-physical System Based on Improved Structural Entropy
2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2)
◽
10.1109/ei250167.2020.9347045
◽
2020
◽
Author(s):
Long Li
◽
Zhenwen Li
◽
Ying Liu
◽
Zhenfeng Xiao
◽
Ye Cai
◽
...
Keyword(s):
Physical System
◽
Vulnerability Analysis
◽
Cyber Physical System
◽
Structural Entropy
Download Full-text
Spatiotemporal ecological vulnerability analysis with statistical correlation based on satellite remote sensing in Samara, Russia
Journal of Environmental Management
◽
10.1016/j.jenvman.2021.112138
◽
2021
◽
Vol 285
◽
pp. 112138
Author(s):
Mukesh Singh Boori
◽
Komal Choudhary
◽
Rustam Paringer
◽
Alexander Kupriyanov
Keyword(s):
Remote Sensing
◽
Satellite Remote Sensing
◽
Vulnerability Analysis
◽
Statistical Correlation
◽
Ecological Vulnerability
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close