举止粗野的人
发表于 2025-3-27 00:58:09
A Comprehensive Study on Cyber Legislation in G20 Countries978-1-4899-6048-1
皱痕
发表于 2025-3-27 04:52:15
EXAM: Explainable Models for Analyzing Malicious Android Applications978-3-642-48032-4
手术刀
发表于 2025-3-27 07:59:33
http://reply.papertrans.cn/15/1465/146495/146495_33.png
容易生皱纹
发表于 2025-3-27 10:07:25
http://reply.papertrans.cn/15/1465/146495/146495_34.png
heart-murmur
发表于 2025-3-27 16:19:46
DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing978-3-540-29870-0
Expurgate
发表于 2025-3-27 21:05:15
Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3978-3-662-25070-9
interpose
发表于 2025-3-28 00:49:44
http://reply.papertrans.cn/15/1465/146495/146495_37.png
Pepsin
发表于 2025-3-28 02:56:46
A Secure Mechanism for Safeguarding Cloud Infrastructure978-3-663-13065-9
Mnemonics
发表于 2025-3-28 09:30:31
http://reply.papertrans.cn/15/1465/146495/146495_39.png
拾落穗
发表于 2025-3-28 11:13:51
An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications978-3-658-30198-9