標(biāo)題: Titlebook: Cloud Computing and Security; Third International Xingming Sun,Han-Chieh Chao,Elisa Bertino Conference proceedings 2017 Springer Internati [打印本頁(yè)] 作者: Abridge 時(shí)間: 2025-3-21 17:52
書目名稱Cloud Computing and Security影響因子(影響力)
書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Cloud Computing and Security被引頻次
書目名稱Cloud Computing and Security被引頻次學(xué)科排名
書目名稱Cloud Computing and Security年度引用
書目名稱Cloud Computing and Security年度引用學(xué)科排名
書目名稱Cloud Computing and Security讀者反饋
書目名稱Cloud Computing and Security讀者反饋學(xué)科排名
作者: 反感 時(shí)間: 2025-3-21 22:38 作者: FELON 時(shí)間: 2025-3-22 00:51 作者: Insatiable 時(shí)間: 2025-3-22 04:48
A Novel Robust Reversible Watermarking Scheme Based on IWTs respectively. Firstly, the robust watermarks are embedded into the mid-low frequency coefficients after the image transformed from spatial domain to frequency domain. Then, side information that used to ensure the reversibility is embedded in spatial domain by the form of fragile watermarks. 5-3 i作者: promote 時(shí)間: 2025-3-22 10:10 作者: WAG 時(shí)間: 2025-3-22 12:55 作者: WAG 時(shí)間: 2025-3-22 21:06 作者: Free-Radical 時(shí)間: 2025-3-22 22:46
Quantum Computer Simulation on GPU Cluster Incorporating Data Localitysable platform for this task. However, the high cost of communication between GPUs makes the simulation inefficiency. To overcome this drawback, we propose the following two methods. (1) A method for GPU cluster quantum simulation to improve the data locality is introduced, and two schemes for data 作者: Harbor 時(shí)間: 2025-3-23 01:46 作者: Agronomy 時(shí)間: 2025-3-23 09:33 作者: 永久 時(shí)間: 2025-3-23 12:47 作者: 營(yíng)養(yǎng) 時(shí)間: 2025-3-23 15:03
Improved STDM Watermarking Using Semantic Information-Based JND Model. The JND model can provide a superior tradeoff between robustness and fidelity. However, the conventional JND models are not fit for the quantization-based watermarking, as the image has been altered by watermarking embedding. In this paper, we present an improved spread transform dither modulation作者: ingestion 時(shí)間: 2025-3-23 18:55 作者: fertilizer 時(shí)間: 2025-3-24 00:14 作者: Trypsin 時(shí)間: 2025-3-24 02:29
SIEM Based on Big Data Analysisment (SIEM) systems have faced with diversity of Volume Big data sources, so it is necessary that big data analysis should be used. This paper presents the architecture and principle of SIEM systems which use popular big data technology. The information security data is transferred from flume to Fli作者: Gorilla 時(shí)間: 2025-3-24 10:04
Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant System The most effective way in green cloud computing is using virtual machine (VM) consolidation to pack VMs into a smaller amount of physical machines (PMs), which can save energy by switching off the idle PMs. However, in traditional static workload approach, VMs are over-provisioned with a static cap作者: BIAS 時(shí)間: 2025-3-24 12:23 作者: JUST 時(shí)間: 2025-3-24 18:29 作者: Mortal 時(shí)間: 2025-3-24 21:09
,Bauelemente, Datenbl?tter, Grenzwerte,tum computers, the effects of the basic quantum gate and the equivalent relation are first briefly concluded in this paper. Base on the general-purpose graphics processing units (GPGPU) environment, the novel basic quantum gate simulation platform is achieved, on which any arbitrary quantum algorith作者: Antarctic 時(shí)間: 2025-3-24 23:34
Abstraktion elektronischer Bauelemente,tly extracted from the received video file. It has the property that can well reduce the error propagated between spatially/temporally correlated macro-blocks. It is required that, the embedded information at the sender side should well capture/reflect the video characteristics. Moreover, the retrie作者: 使成核 時(shí)間: 2025-3-25 05:12 作者: ATRIA 時(shí)間: 2025-3-25 11:04
Grundbegriffe der Elektrotechnik, transmitted in compressed form, so research and development of such a scheme is necessary. Hong et al. proposed a reversible information hiding based approach based on AMBTC compression of images to provide considerable embedding capacity and effectively reduce the bit-rate. However, it did not car作者: 強(qiáng)有力 時(shí)間: 2025-3-25 11:56
,Nachhaltige Unternehmensführung,nt by intentional attackers, it has become a very important topic in image forensics. Most of the existing detection methods designed to region duplication are based on the exhaustive block-matching of image pixels or transformed coefficients. They may be not efficient when the duplicate regions are作者: 草率男 時(shí)間: 2025-3-25 19:10 作者: 切掉 時(shí)間: 2025-3-25 21:26 作者: BANAL 時(shí)間: 2025-3-26 00:52
Kapitel 3: Anwendungen 1. Ordnung,watermarking schemes are proposed to prevent malicious attacks in recent years. An innovative algorithm is proposed in this work to resist key frames dropping and detect the subtitle tampered. Firstly, Simple Linear Iterative Clustering (SLIC) Superpixels are used to extract the natural codes of the作者: WAG 時(shí)間: 2025-3-26 07:32 作者: 橢圓 時(shí)間: 2025-3-26 09:50 作者: 咽下 時(shí)間: 2025-3-26 13:56 作者: evasive 時(shí)間: 2025-3-26 17:23 作者: MINT 時(shí)間: 2025-3-26 21:46 作者: 色情 時(shí)間: 2025-3-27 01:09 作者: 附錄 時(shí)間: 2025-3-27 05:30 作者: 合同 時(shí)間: 2025-3-27 09:32 作者: 河潭 時(shí)間: 2025-3-27 14:53 作者: 窩轉(zhuǎn)脊椎動(dòng)物 時(shí)間: 2025-3-27 18:02 作者: Formidable 時(shí)間: 2025-3-27 23:57 作者: 左右連貫 時(shí)間: 2025-3-28 04:32 作者: 動(dòng)物 時(shí)間: 2025-3-28 08:49 作者: Efflorescent 時(shí)間: 2025-3-28 10:36 作者: 心胸狹窄 時(shí)間: 2025-3-28 16:51
Coverless Information Hiding Technology Research Based on News Aggregationhides N in a news web by changing the order of news headlines. Experimental results and analysis show that this method is robust for any current steganalysis algorithm, and effective for stego-message delivery.作者: arthroplasty 時(shí)間: 2025-3-28 21:33 作者: countenance 時(shí)間: 2025-3-29 01:17 作者: 熄滅 時(shí)間: 2025-3-29 03:47 作者: Perceive 時(shí)間: 2025-3-29 10:14 作者: Parameter 時(shí)間: 2025-3-29 13:18
https://doi.org/10.34157/9783648157725ography method based on patched block. This strategy can make the post-processing sub-image be influenced by all the sub-images which have already embedded. The experimental results show that the proposed method is more secure than CMD image steganographic method.作者: indignant 時(shí)間: 2025-3-29 18:54
Schnellfilter ihr Bau und Betrieb by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.作者: Cosmopolitan 時(shí)間: 2025-3-29 22:37
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling Experimental results show that the proposed scheme can not only provide large watermark capacity and good imperceptibility, but also can resist the impact of print-scan on the image, and has strong robustness.作者: synovium 時(shí)間: 2025-3-30 02:49 作者: 貪婪的人 時(shí)間: 2025-3-30 05:00
Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.作者: 混合物 時(shí)間: 2025-3-30 08:45 作者: scotoma 時(shí)間: 2025-3-30 15:34 作者: candle 時(shí)間: 2025-3-30 19:42 作者: AWE 時(shí)間: 2025-3-30 20:48 作者: Ferritin 時(shí)間: 2025-3-31 01:36
SIEM Based on Big Data Analysisend, the full paper is summarized and the future work should be the usage of stream computing in the SIEM to solve inform security problem in large-scale network with the continuously producing information security data.作者: 悄悄移動(dòng) 時(shí)間: 2025-3-31 05:06 作者: 招募 時(shí)間: 2025-3-31 11:34 作者: chemoprevention 時(shí)間: 2025-3-31 14:02
https://doi.org/10.1007/978-3-662-62146-2 frequent words distance, normal texts containing the secret information could be retrieved from the text database, and will be sent to the receiver without any modification. Because the embedding is not needed, the proposed method could be able to escape from almost all state-of-the-art steganalysis methods.