举止粗野的人 发表于 2025-3-27 00:58:09
A Comprehensive Study on Cyber Legislation in G20 Countries978-1-4899-6048-1皱痕 发表于 2025-3-27 04:52:15
EXAM: Explainable Models for Analyzing Malicious Android Applications978-3-642-48032-4手术刀 发表于 2025-3-27 07:59:33
http://reply.papertrans.cn/15/1465/146495/146495_33.png容易生皱纹 发表于 2025-3-27 10:07:25
http://reply.papertrans.cn/15/1465/146495/146495_34.pngheart-murmur 发表于 2025-3-27 16:19:46
DNNdroid: Android Malware Detection Framework Based on Federated Learning and Edge Computing978-3-540-29870-0Expurgate 发表于 2025-3-27 21:05:15
Performance Analyses of Black Hole Attack in AODV Routing Protocol in Vanet Using NS3978-3-662-25070-9interpose 发表于 2025-3-28 00:49:44
http://reply.papertrans.cn/15/1465/146495/146495_37.pngPepsin 发表于 2025-3-28 02:56:46
A Secure Mechanism for Safeguarding Cloud Infrastructure978-3-663-13065-9Mnemonics 发表于 2025-3-28 09:30:31
http://reply.papertrans.cn/15/1465/146495/146495_39.png拾落穗 发表于 2025-3-28 11:13:51
An Analysis of Lightweight Cryptographic Algorithms for IoT-Applications978-3-658-30198-9