標(biāo)題: Titlebook: Cybersecurity and Secure Information Systems; Challenges and Solut Aboul Ella Hassanien,Mohamed Elhoseny Book 2019 Springer Nature Switzerl [打印本頁(yè)] 作者: 萬(wàn)能 時(shí)間: 2025-3-21 18:21
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems影響因子(影響力)
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems被引頻次
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems被引頻次學(xué)科排名
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems年度引用
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems年度引用學(xué)科排名
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems讀者反饋
書(shū)目名稱(chēng)Cybersecurity and Secure Information Systems讀者反饋學(xué)科排名
作者: 克制 時(shí)間: 2025-3-21 23:07
Proof-theoretic Properties of SSLunication Layer, (iii) Cloud Layer. Users, Devices, Gateway, Connection, Cloud, and Application are combined to create the various layers for IoT environment. The security issues in the cloud layer for IoT has addressed by a multilevel encryption scheme has proposed with flexible key management in the cloud environment.作者: 無(wú)法治愈 時(shí)間: 2025-3-22 02:53 作者: 敵手 時(shí)間: 2025-3-22 05:27
International Criminal Law Enforcementration, and identification of well-known botnets), geolocation and attack pattern visualization, and autonomic frameworks based on the observe, orient, decide, act methodology. Directions for future work are also be discussed.作者: mechanical 時(shí)間: 2025-3-22 10:29
An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herdingaptive Elephant Herding Optimization (AEHO) used. This technique Signcryption is the technique that mixes the functionality of encryption and digital signature in a single logical step. From the implementation, the results are evaluated through the usage of the Peak Signal to Noise Ratio (PSNR) and Mean square errors (MSE).作者: Anemia 時(shí)間: 2025-3-22 16:51 作者: Anemia 時(shí)間: 2025-3-22 17:32
Book 2019 specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas.? ..The content comprises high-quality research a作者: In-Situ 時(shí)間: 2025-3-22 23:12 作者: extinguish 時(shí)間: 2025-3-23 05:20
Some Specific Examples of Attacks on Information Systems and Smart Cities Applications,rth part, is listed the procedure for attacking hash digest data as well as the procedure for hiding information using the Python programming language and the Kali Linux environment. Finally, lists the final considerations and gives suggestions for further research in the field of cybersecurity attacks on smart cities.作者: 思鄉(xiāng)病 時(shí)間: 2025-3-23 09:01 作者: maverick 時(shí)間: 2025-3-23 10:14
Cybersecurity and Secure Information Systems978-3-030-16837-7Series ISSN 1613-5113 Series E-ISSN 2363-9466 作者: 欄桿 時(shí)間: 2025-3-23 15:49 作者: 喊叫 時(shí)間: 2025-3-23 21:55 作者: 吊胃口 時(shí)間: 2025-3-24 01:55 作者: 運(yùn)動(dòng)的我 時(shí)間: 2025-3-24 04:29
Reasoning about Structured Specificationsponsible for various cyber attacks like spamming, identity theft, financial fraud, etc. The internet growth has also resulted in increase of fraudulent activities in the web. The classical methods like blacklisting is ineffective in detecting newly generated malicious URL’s. So there arises a need t作者: OWL 時(shí)間: 2025-3-24 10:10 作者: hazard 時(shí)間: 2025-3-24 11:26
Proof-theoretic Properties of SSLetection are based on blacklisting and heuristics technique. These methods require human intervention to update if any new Spam and Phishing activity occurs. Moreover, these are completely inefficient in detecting new Spam and Phishing activities. These techniques can detect malicious activity only 作者: finale 時(shí)間: 2025-3-24 15:55 作者: 裂隙 時(shí)間: 2025-3-24 19:37 作者: Arthropathy 時(shí)間: 2025-3-25 02:25
Introduction: Genesis of the Tele-Text,ad conditions. A protected data can be transmitted through VANET, LEACH protocol based clustering and Light Weight cryptographically Model is considered. At first, grouping the vehicles into clusters and sorting out the network by clusters are a standout amongst the most comprehensive and most adequ作者: 潰爛 時(shí)間: 2025-3-25 06:27
Adapting Television and Literaturets. In the first and second part, the basic introductory considerations and some of our previous research in the field of security of information systems and security management in the cyberspace are listed. In the third part, are given specific examples of XSS and CSRF attacks. In addition, is give作者: Rotator-Cuff 時(shí)間: 2025-3-25 08:27 作者: GRAVE 時(shí)間: 2025-3-25 12:44
https://doi.org/10.1057/9780333977774ture for malware family identification which converts malware binaries into gray scale images and then identifies their families by a hybrid in-house model, Convolutional Neural Network and Long Short Term Memory (CNN-LSTM). The significance of the hybrid model enables the network to capture the spa作者: Muscularis 時(shí)間: 2025-3-25 19:48
International Criminal Law Enforcementrsecurity research and education. In this article, we describe the design and implementation of an education and research Security Operations Center (SOC) to address these issues. The design of a SOC to meet educational goals as well as perform cloud security research is presented, including a discu作者: ANIM 時(shí)間: 2025-3-25 21:18 作者: 小步舞 時(shí)間: 2025-3-26 02:04 作者: 絆住 時(shí)間: 2025-3-26 07:53
Aboul Ella Hassanien,Mohamed ElhosenyProvides numerous specific use-cases throughout, showing practical applications of the presented concepts.Collects contributions from leading experts around the globe with the latest insights on emerg作者: Graduated 時(shí)間: 2025-3-26 08:42
Advanced Sciences and Technologies for Security Applicationshttp://image.papertrans.cn/d/image/241914.jpg作者: myelography 時(shí)間: 2025-3-26 13:04 作者: Atrium 時(shí)間: 2025-3-26 18:36 作者: critique 時(shí)間: 2025-3-27 00:15
An Efficient Image Encryption Scheme Based on Signcryption Technique with Adaptive Elephant Herdingusly. The researchers of the study distinguished and examined the vital open difficulties in fortifying the security in IoT that combines encryption strategies to offer security to exchanged images between connected networks of the two parties. The device is primarily based on a hybrid algorithm tha作者: 好開(kāi)玩笑 時(shí)間: 2025-3-27 04:12 作者: 發(fā)起 時(shí)間: 2025-3-27 08:49 作者: 抗原 時(shí)間: 2025-3-27 13:30
Deep Learning Framework for Cyber Threat Situational Awareness Based on Email and URL Data Analysisetection are based on blacklisting and heuristics technique. These methods require human intervention to update if any new Spam and Phishing activity occurs. Moreover, these are completely inefficient in detecting new Spam and Phishing activities. These techniques can detect malicious activity only 作者: N防腐劑 時(shí)間: 2025-3-27 16:57 作者: 套索 時(shí)間: 2025-3-27 20:02
Improved DGA Domain Names Detection and Categorization Using Deep Learning Architectures with Classge number of domain names after that utilization a little subset for real command and control (C&C) server communication. DNS blacklist based on blacklisting and sink-holing is the most commonly used approach to block DGA C&C traffic. This is a daunting task because the network admin has to continuo作者: GULLY 時(shí)間: 2025-3-27 22:47 作者: Encapsulate 時(shí)間: 2025-3-28 03:08 作者: reperfusion 時(shí)間: 2025-3-28 07:37
Clustering Based Cybersecurity Model for Cloud Data, texts) in the cloud has turned into a pattern among individual and hierarchical clients. Be that as it may, cloud service providers can’t be trusted entirely to guarantee the accessibility or honesty of client data re-appropriated/transferred to the cloud. Consequently, to enhance the cybersecurity作者: 安裝 時(shí)間: 2025-3-28 13:10
A Detailed Investigation and Analysis of Deep Learning Architectures and Visualization Techniques fture for malware family identification which converts malware binaries into gray scale images and then identifies their families by a hybrid in-house model, Convolutional Neural Network and Long Short Term Memory (CNN-LSTM). The significance of the hybrid model enables the network to capture the spa作者: 非秘密 時(shí)間: 2025-3-28 15:28
Design and Implementation of a Research and Education Cybersecurity Operations Center,rsecurity research and education. In this article, we describe the design and implementation of an education and research Security Operations Center (SOC) to address these issues. The design of a SOC to meet educational goals as well as perform cloud security research is presented, including a discu作者: 淺灘 時(shí)間: 2025-3-28 22:04
You Are Here: , as Graphic Novelo the residents, visitors and local government to meet the ever expanding and manifold demands. When the city goes urban, its residents may suffer from various privacy and security issues due to smart city applications vulnerabilities. This chapter delivers a comprehensive overview of the security a作者: daredevil 時(shí)間: 2025-3-29 02:07 作者: 五行打油詩(shī) 時(shí)間: 2025-3-29 05:56 作者: 強(qiáng)壯 時(shí)間: 2025-3-29 10:39 作者: 巡回 時(shí)間: 2025-3-29 13:27
Adapting Television and Literaturesion detection, traffic analysis and Android malware detection. In all the experiments of intrusion detection, deep learning architectures performed well in compared to classical machine learning algorithms. Moreover, deep learning architectures have achieved good performance in traffic analysis and作者: Guileless 時(shí)間: 2025-3-29 19:01
Adapting Television and Literaturet be used in real-time DGA domain detection. Additionally, these techniques use passive DNS and NXDomain information. Integration of all these various information charges high-cost and in some case is highly impossible to obtain all these information because of real-time constraints. Detecting DGA o作者: 行為 時(shí)間: 2025-3-29 22:16 作者: 填料 時(shí)間: 2025-3-30 01:22 作者: 寬大 時(shí)間: 2025-3-30 06:25 作者: Invigorate 時(shí)間: 2025-3-30 11:45