標題: Titlebook: Cyberspace Safety and Security; 13th International S Weizhi Meng,Mauro Conti Conference proceedings 2022 Springer Nature Switzerland AG 202 [打印本頁] 作者: controllers 時間: 2025-3-21 17:04
書目名稱Cyberspace Safety and Security影響因子(影響力)
書目名稱Cyberspace Safety and Security影響因子(影響力)學科排名
書目名稱Cyberspace Safety and Security網(wǎng)絡公開度
書目名稱Cyberspace Safety and Security網(wǎng)絡公開度學科排名
書目名稱Cyberspace Safety and Security被引頻次
書目名稱Cyberspace Safety and Security被引頻次學科排名
書目名稱Cyberspace Safety and Security年度引用
書目名稱Cyberspace Safety and Security年度引用學科排名
書目名稱Cyberspace Safety and Security讀者反饋
書目名稱Cyberspace Safety and Security讀者反饋學科排名
作者: 細微差別 時間: 2025-3-21 22:45
A Novel Method of Template Protection and Two-Factor Authentication Protocol Based on Biometric and作者: Friction 時間: 2025-3-22 00:46
List of symbols and References,n, we use the stacking algorithm in ensemble learning to combine them to form a new classifier. Finally, relying on the Datacon2020 dataset, extensive experiments are conducted. The experimental results indicate that the proposed method improves the detection rate of encrypted malicious traffic whil作者: 表兩個 時間: 2025-3-22 08:37 作者: PATHY 時間: 2025-3-22 09:46
Metabolism of White Adipose Tissuemachine learning (ML) algorithms across different temporal granularities and identify behavioral changes. In our experiments with on-chain SCs, we were able to find a total of 1094 benign SCs across different granularities which behave similar to malicious SCs, with the inclusion of the smart contra作者: 挫敗 時間: 2025-3-22 14:07
Macrophages, Adipocytes, and Obesitynmental factors to filter out results outside estimated effective transmission distance, and also take airborne transmission into consideration. In addition, we implement a rerandomizable signature scheme with blockchain bulletin board to provide confidentiality and integrity. We also evaluate the p作者: 挫敗 時間: 2025-3-22 18:55
https://doi.org/10.1007/978-1-59745-370-7iled security analysis on the system design and a full evaluation on the performance of PQ-KES4Chain including the time of chaincodes execution and the on-chain storage space. We further discuss the implications of our findings, which could be helpful for the developers of PQ KEM algorithms and appl作者: 紳士 時間: 2025-3-23 00:41
Jeffrey M. Gimble,Bruce A. Bunnellm an acquired deduplicated file system volume and implement it into TSK to extend TSK for supporting data deduplication. Furthermore, we also study the positive forensic implications of data deduplication techniques, which are seldom considered in existing studies. Specially, we also investigate new作者: ingenue 時間: 2025-3-23 04:14 作者: 姑姑在炫耀 時間: 2025-3-23 08:33
A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks,ets the desirable security requirements, such as correctness, conditional privacy preserving and message authentication. And compared with some existing schemes, our proposed scheme enjoys better efficiency in both computation and communication.作者: appall 時間: 2025-3-23 13:11
,Vulnerability and?Transaction Behavior Based Detection of?Malicious Smart Contracts,machine learning (ML) algorithms across different temporal granularities and identify behavioral changes. In our experiments with on-chain SCs, we were able to find a total of 1094 benign SCs across different granularities which behave similar to malicious SCs, with the inclusion of the smart contra作者: 很是迷惑 時間: 2025-3-23 14:35
Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseasenmental factors to filter out results outside estimated effective transmission distance, and also take airborne transmission into consideration. In addition, we implement a rerandomizable signature scheme with blockchain bulletin board to provide confidentiality and integrity. We also evaluate the p作者: 徹底檢查 時間: 2025-3-23 18:34
Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain,iled security analysis on the system design and a full evaluation on the performance of PQ-KES4Chain including the time of chaincodes execution and the on-chain storage space. We further discuss the implications of our findings, which could be helpful for the developers of PQ KEM algorithms and appl作者: 救護車 時間: 2025-3-24 01:26 作者: 專心 時間: 2025-3-24 05:17
Encrypted Malicious Traffic Detection Based on Ensemble Learning, protection through encryption technology. Regular expression matching based methods, such as deep packet inspection that relies on plaintext traffic cannot be applied to detecting encrypted random communication content, and the existing detecting methods based on time-series features often ignore t作者: 努力趕上 時間: 2025-3-24 08:16 作者: 銀版照相 時間: 2025-3-24 14:41 作者: Brochure 時間: 2025-3-24 16:41 作者: osculate 時間: 2025-3-24 20:04
,Vulnerability and?Transaction Behavior Based Detection of?Malicious Smart Contracts,te’ nature of the programming language (Solidity) in which SCs are written. This also opens up different vulnerabilities and bugs in SCs that malicious actors exploit to carry out malicious or illegal activities on the cryptocurrency platform. In this work, we study the correlation between malicious作者: 膽小懦夫 時間: 2025-3-25 01:36
,Realizing Information Flow Control in?ABAC Mining,ine-grained access control. As a result, many Role-Based Access Control (RBAC) systems are migrating to ABAC. In such migrations, ABAC mining is used to create ABAC policies from existing RBAC policies. Although ABAC has several advantages, it lacks one of the crucial features required for reliable 作者: cravat 時間: 2025-3-25 07:17 作者: 阻撓 時間: 2025-3-25 10:26
Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Disease. The crucial idea is to scan and record close contacts between users using mobile devices, in order to notify persons when their close contact(s) is diagnosed positive. Current contact tracing systems’ false-positive rate is too high to be practical as they do not filter Bluetooth scan results outs作者: 外貌 時間: 2025-3-25 15:01
A Privacy-Preserving Logistics Information System with Traceability,In recent years, with the rise of online shopping, LIS is becoming increasingly important. However, since the lack of effective protection of personal information, privacy protection issue has become the most problem concerned by users. Some data breach events in LIS released users’ personal informa作者: OVERT 時間: 2025-3-25 19:50 作者: Incisor 時間: 2025-3-25 20:39 作者: configuration 時間: 2025-3-26 00:48 作者: Longitude 時間: 2025-3-26 07:50
https://doi.org/10.1007/978-3-030-94029-4access control; artificial intelligence; authentication; computer networks; computer science; computer se作者: upstart 時間: 2025-3-26 10:07 作者: 啪心兒跳動 時間: 2025-3-26 14:09 作者: DUST 時間: 2025-3-26 20:29
Adiabatic Waves in Liquid-Vapor Systemshe intelligent management level of traffic services. However, Vehicle Networks also bring a series of challenges, such as information leakage and message manipulation. In this paper, we introduce a novel federated learning assisted privacy preserving scheme for Vehicle Networks. In the proposed sche作者: ALTER 時間: 2025-3-26 22:51 作者: 壓碎 時間: 2025-3-27 04:18
Consequences of Rapid Weight Lossn compromised web applications. With the growth of the demand for interactive web applications, the webshell timely detection in web applications are essential to ensure security of web server. Although there are some existing methods for webshell detection, these methods need a large number of samp作者: 令人心醉 時間: 2025-3-27 06:45 作者: 蒸發(fā) 時間: 2025-3-27 11:47
Giamila Fantuzzi,Theodore Mazzoneine-grained access control. As a result, many Role-Based Access Control (RBAC) systems are migrating to ABAC. In such migrations, ABAC mining is used to create ABAC policies from existing RBAC policies. Although ABAC has several advantages, it lacks one of the crucial features required for reliable 作者: medium 時間: 2025-3-27 14:19
https://doi.org/10.1007/978-1-59745-370-7eak password vulnerabilities, the hackers can gain access to the systems easily. Weak password scanning is an important part of penetration testing. In order to enable penetration testers to discover weak passwords in the system more conveniently, this paper proposes a system for weak password scann作者: 冷峻 時間: 2025-3-27 20:33 作者: Audiometry 時間: 2025-3-28 01:32
Interactions of Adipose and Lymphoid TissuesIn recent years, with the rise of online shopping, LIS is becoming increasingly important. However, since the lack of effective protection of personal information, privacy protection issue has become the most problem concerned by users. Some data breach events in LIS released users’ personal informa作者: 我不重要 時間: 2025-3-28 03:48
https://doi.org/10.1007/978-1-59745-370-7 data private while supervision peers want to reveal the on-chain private data under certain circumstances like financial regulation and judicial forensics, and key escrow is an idea to solve the problem. Since current key escrow schemes heavily rely on traditional asymmetric encryption and decrypti作者: 財政 時間: 2025-3-28 09:39
Jeffrey M. Gimble,Bruce A. Bunnelln. This problem is addressed by survivable SSO protocols relying on distributed architectures that enable a set of servers to collectively authenticate a user. However, existing survivable SSO protocols have limitations because they do not allow service providers to modify security parameters after 作者: antecedence 時間: 2025-3-28 10:41
Jeffrey M. Gimble,Bruce A. Bunnellns. However, rehydration of deduplicated files is not yet a functionality supported in forensic tools. With the increasing cost of cybercrimes each year, and more users looking for ways to save storage space on ever growing file sizes, developing forensic tools to support detection and recovery of d作者: 運動性 時間: 2025-3-28 17:21 作者: Decline 時間: 2025-3-28 22:31 作者: Choreography 時間: 2025-3-29 00:15 作者: 多嘴多舌 時間: 2025-3-29 04:44
0302-9743 cuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace..978-3-030-94028-7978-3-030-94029-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: dearth 時間: 2025-3-29 11:10 作者: 圓桶 時間: 2025-3-29 12:22 作者: 戰(zhàn)役 時間: 2025-3-29 15:59 作者: Missile 時間: 2025-3-29 21:43 作者: MONY 時間: 2025-3-30 00:12 作者: 植物學 時間: 2025-3-30 06:48 作者: Employee 時間: 2025-3-30 12:03 作者: 思考 時間: 2025-3-30 15:21 作者: GRILL 時間: 2025-3-30 19:44 作者: 新義 時間: 2025-3-31 00:43