標(biāo)題: Titlebook: Availability, Reliability, and Security in Information Systems; IFIP WG 8.4, 8.9, TC Francesco Buccafurri,Andreas Holzinger,Edgar Weipp Con [打印本頁(yè)] 作者: controllers 時(shí)間: 2025-3-21 19:33
書目名稱Availability, Reliability, and Security in Information Systems影響因子(影響力)
書目名稱Availability, Reliability, and Security in Information Systems影響因子(影響力)學(xué)科排名
書目名稱Availability, Reliability, and Security in Information Systems網(wǎng)絡(luò)公開(kāi)度
書目名稱Availability, Reliability, and Security in Information Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Availability, Reliability, and Security in Information Systems被引頻次
書目名稱Availability, Reliability, and Security in Information Systems被引頻次學(xué)科排名
書目名稱Availability, Reliability, and Security in Information Systems年度引用
書目名稱Availability, Reliability, and Security in Information Systems年度引用學(xué)科排名
書目名稱Availability, Reliability, and Security in Information Systems讀者反饋
書目名稱Availability, Reliability, and Security in Information Systems讀者反饋學(xué)科排名
作者: 爵士樂(lè) 時(shí)間: 2025-3-21 22:36
Conference proceedings 2016apers and 4 short papers presented were carefully reviewed and selected from 23 submissions. They are organized in the following topical sections: Web and semantics; diagnosis, prediction and machine learning; security and privacy; visualization and risk management; and privacy aware machine learning for health data science..作者: 蚊帳 時(shí)間: 2025-3-22 00:33
0302-9743 ized in the following topical sections: Web and semantics; diagnosis, prediction and machine learning; security and privacy; visualization and risk management; and privacy aware machine learning for health data science..978-3-319-45506-8978-3-319-45507-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: anarchist 時(shí)間: 2025-3-22 05:33
https://doi.org/10.1007/978-3-8350-9270-9phase, in order to consider adequate provisions for prevention and reaction to cyber systemic risk in banking systems. In particular, the context of the Italian banking system is considered as a case study.作者: graphy 時(shí)間: 2025-3-22 11:11
Modeling Cyber Systemic Risk for the Business Continuity Plan of a Bankphase, in order to consider adequate provisions for prevention and reaction to cyber systemic risk in banking systems. In particular, the context of the Italian banking system is considered as a case study.作者: 名義上 時(shí)間: 2025-3-22 15:03 作者: 增強(qiáng) 時(shí)間: 2025-3-22 19:08 作者: CYN 時(shí)間: 2025-3-23 01:17 作者: 儲(chǔ)備 時(shí)間: 2025-3-23 03:36
Abschnitt III: Thesenartige Zusammenfassung,at enables users to compose their own UIs for requesting complex products, by combining existing UI descriptions for different parts of the particular complex product, as well as to share and improve UI descriptions among other users within the markets.作者: 同步信息 時(shí)間: 2025-3-23 08:14 作者: 鴕鳥(niǎo) 時(shí)間: 2025-3-23 10:56 作者: prosthesis 時(shí)間: 2025-3-23 17:11 作者: Tonometry 時(shí)間: 2025-3-23 19:31 作者: Lipoprotein(A) 時(shí)間: 2025-3-24 00:30
A Threat to Friendship Privacy in Facebookounts in Twitter and a social network property, recently demonstrated for Twitter, called interest assortativity. The preliminary experimental results reported in this paper, give a first evidence of the effectiveness of our attack, which succeeds even in the most difficult case that is when the information about the victim are minimum.作者: 改進(jìn) 時(shí)間: 2025-3-24 03:29
Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspectiveir approach to risk assessment. Two options for improving the ability to perform thorough yet efficient assessments of cyber risk are explored in this paper: basing analysis on reusable sector-specific risk models, and including managed security service providers (MSSPs) in the value chain.作者: FUSE 時(shí)間: 2025-3-24 07:39 作者: COLON 時(shí)間: 2025-3-24 14:42
https://doi.org/10.1007/978-3-319-45507-5natural language generation; risk management; security and privacy; semantic Web; social network analysi作者: Vulnerable 時(shí)間: 2025-3-24 17:31 作者: CREST 時(shí)間: 2025-3-24 21:37 作者: negligence 時(shí)間: 2025-3-25 00:21
Theorie der Unternehmenskooperation,y new model of graphic visualization that is similar to the Voronoi diagrams. The proposed graphical model uses the size, color and opacity of the cell to display host parameters. The paper describes a technique for new graphical model construction and gives examples of its application along with traditional graph based and other models.作者: 頌揚(yáng)國(guó)家 時(shí)間: 2025-3-25 07:03 作者: nullify 時(shí)間: 2025-3-25 08:51 作者: Pruritus 時(shí)間: 2025-3-25 12:25
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/b/image/166937.jpg作者: 意外 時(shí)間: 2025-3-25 18:06
Reihe Rechtswissenschaft ab Bd. 209tion environment. We propose algebra of RDF graphs and its physical counterpart, physical algebra of RDF graphs, designed to implement queries as distributed dataflow programs that run on cluster of servers. Operations of algebra reflect the characteristic features of RDF graph data model while they作者: 無(wú)辜 時(shí)間: 2025-3-25 23:08
https://doi.org/10.1007/978-3-658-16307-5 hand, the actors involved in the publishing process are often driven by incentives which may, and increasingly do, undermine the quality of published work, especially in the presence of unethical conduits. In this work we investigate the feasibility of a tool capable of generating fake reviews for 作者: 整體 時(shí)間: 2025-3-26 03:14 作者: 察覺(jué) 時(shí)間: 2025-3-26 06:26
Schlussbetrachtung und Ausblick,s. As such, they constitute a conceptual evolution of active systems, a class of discrete-event systems introduced into the literature two decades ago. A complex active system is a hierarchy of active systems, each one characterized by its own behavior expressed by the interaction of several communi作者: Hangar 時(shí)間: 2025-3-26 10:30 作者: 不合 時(shí)間: 2025-3-26 15:18 作者: conservative 時(shí)間: 2025-3-26 18:54
Grenzüberschreitende Kooperationenre users personalize their Facebook privacy settings. As a matter of fact, the list of friends is often one of the profile sections kept private, meaning that this information is perceived as sensible..In this paper, we study the robustness of this privacy protection feature, showing that it can be 作者: blackout 時(shí)間: 2025-3-26 23:02
https://doi.org/10.1007/978-3-663-08049-7ata communication such as digital signatures, ip-security, data-authentication, e-mail security, and security of pervasive computing. Additionally, the AE is a potential primitive of security solution for IoT-end device, RfID, and constrained device. Though there are many constructions of AE, but th作者: 脫水 時(shí)間: 2025-3-27 03:52 作者: 落葉劑 時(shí)間: 2025-3-27 06:55
Theorie der Unternehmenskooperation,y new model of graphic visualization that is similar to the Voronoi diagrams. The proposed graphical model uses the size, color and opacity of the cell to display host parameters. The paper describes a technique for new graphical model construction and gives examples of its application along with tr作者: Leaven 時(shí)間: 2025-3-27 11:49 作者: fiction 時(shí)間: 2025-3-27 13:36 作者: 難理解 時(shí)間: 2025-3-27 21:20 作者: 冒煙 時(shí)間: 2025-3-28 00:06
Theorie der Unternehmenskooperation,s is where graph databases are powerful. Nevertheless, software developers model and think in object-oriented software. Combining both approaches leads to a paradigm mismatch. This mismatch can be addressed by using object graph mappers (OGM). OGM adapt graph databases for object-oriented code, to r作者: etiquette 時(shí)間: 2025-3-28 04:40
Theorie der Unternehmenskooperation,esults, electronic chart records, or hospitalization transactions. Publicly available sequential datasets for research purposes promises new insights, such as understanding patient types, and recognizing emerging diseases. Unfortunately, the publication of sequential data presents a significant thre作者: 改良 時(shí)間: 2025-3-28 06:51 作者: garrulous 時(shí)間: 2025-3-28 10:24
https://doi.org/10.1007/978-3-7091-0402-6’s economic backbone. The sensitivity of those infrastructures to disturbances in their knowledge bases is therefore of crucial interest for companies, organizations, customers and regulating bodies. This holds true with respect to the direct provisioning of such information in crucial applications 作者: ARIA 時(shí)間: 2025-3-28 15:55 作者: 格子架 時(shí)間: 2025-3-28 22:18 作者: 容易懂得 時(shí)間: 2025-3-29 00:59 作者: Deadpan 時(shí)間: 2025-3-29 05:24
Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Saand indirectly manipulating and interacting with an algorithm. For this purpose, we selected the Ant Colony Optimization (ACO) framework, and use it on the Traveling Salesman Problem (TSP) which is of high importance in solving many practical problems in health informatics, e.g. in the study of prot作者: 難解 時(shí)間: 2025-3-29 10:55
A Blockcipher Based Authentication Encryptiononstruction of AE should satisfies the properties of efficiency and upper security bound due to limitation of power and memory for the constrained device. Therefore, we propose a blockcipher based AE that satisfies upper privacy security bound . and it operates in parallel mode. It doesn’t need decr作者: 不感興趣 時(shí)間: 2025-3-29 13:09
An Efficient Construction of a Compression Function for Cryptographic Hashound rather than efficiency. Therefore, a more efficient construction of blockcipher based compression function is proposed, where it provides higher efficiency-rate including a satisfactory collision security bound. The efficiency-rate . of the proposed scheme is .. Furthermore, the collision secur作者: NICE 時(shí)間: 2025-3-29 16:30 作者: Instantaneous 時(shí)間: 2025-3-29 21:33 作者: 草率男 時(shí)間: 2025-3-30 02:14
A Peer-to-Peer Protocol and System Architecture for Privacy-Preserving Statistical Analysislements the primitive instructions foreseen by the architecture. An open-source reference implementation of this architecture is provided for the R language. We use these results to argue that the tension between medical research and privacy requirements can be technically alleviated and we outline 作者: aspersion 時(shí)間: 2025-3-30 04:05
The Right to Be Forgotten: Towards Machine Learning on Perturbed Knowledge Basesditions. Their choices include a re-design of their data infrastructure as well as preventive actions like anonymization of databases per default. Therefore, insights into the effects of perturbed/anonymized knowledge bases on the quality of machine learning results are a crucial basis for successfu作者: committed 時(shí)間: 2025-3-30 08:42 作者: needle 時(shí)間: 2025-3-30 15:10 作者: BIDE 時(shí)間: 2025-3-30 16:34 作者: reception 時(shí)間: 2025-3-31 00:00
Politikwissenschaftliche Paperbacksand indirectly manipulating and interacting with an algorithm. For this purpose, we selected the Ant Colony Optimization (ACO) framework, and use it on the Traveling Salesman Problem (TSP) which is of high importance in solving many practical problems in health informatics, e.g. in the study of prot作者: BUMP 時(shí)間: 2025-3-31 01:31
https://doi.org/10.1007/978-3-663-08049-7onstruction of AE should satisfies the properties of efficiency and upper security bound due to limitation of power and memory for the constrained device. Therefore, we propose a blockcipher based AE that satisfies upper privacy security bound . and it operates in parallel mode. It doesn’t need decr作者: 連系 時(shí)間: 2025-3-31 06:38
Problemstellung und Gang der Untersuchung,ound rather than efficiency. Therefore, a more efficient construction of blockcipher based compression function is proposed, where it provides higher efficiency-rate including a satisfactory collision security bound. The efficiency-rate . of the proposed scheme is .. Furthermore, the collision secur作者: cumulative 時(shí)間: 2025-3-31 11:17 作者: 小故事 時(shí)間: 2025-3-31 13:53
Theorie der Unternehmenskooperation,onal periodicity levels into consideration. Each model captures transitions between times and states according to shorter parts of the sequence, which is eventually reconstructed. Anonymity is provided by utilizing only elements of the model that guarantee differential privacy. Furthermore, we devel作者: 匍匐 時(shí)間: 2025-3-31 21:12
Theorie der Unternehmenskooperation,lements the primitive instructions foreseen by the architecture. An open-source reference implementation of this architecture is provided for the R language. We use these results to argue that the tension between medical research and privacy requirements can be technically alleviated and we outline 作者: rheumatism 時(shí)間: 2025-3-31 22:18
https://doi.org/10.1007/978-3-7091-0402-6ditions. Their choices include a re-design of their data infrastructure as well as preventive actions like anonymization of databases per default. Therefore, insights into the effects of perturbed/anonymized knowledge bases on the quality of machine learning results are a crucial basis for successfu作者: 匍匐 時(shí)間: 2025-4-1 02:23 作者: CRASS 時(shí)間: 2025-4-1 06:21