標(biāo)題: Titlebook: Data and Applications Security and Privacy XXXIV; 34th Annual IFIP WG Anoop Singhal,Jaideep Vaidya Conference proceedings 2020 IFIP Intern [打印本頁] 作者: Obsolescent 時間: 2025-3-21 19:07
書目名稱Data and Applications Security and Privacy XXXIV影響因子(影響力)
書目名稱Data and Applications Security and Privacy XXXIV影響因子(影響力)學(xué)科排名
書目名稱Data and Applications Security and Privacy XXXIV網(wǎng)絡(luò)公開度
書目名稱Data and Applications Security and Privacy XXXIV網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data and Applications Security and Privacy XXXIV被引頻次
書目名稱Data and Applications Security and Privacy XXXIV被引頻次學(xué)科排名
書目名稱Data and Applications Security and Privacy XXXIV年度引用
書目名稱Data and Applications Security and Privacy XXXIV年度引用學(xué)科排名
書目名稱Data and Applications Security and Privacy XXXIV讀者反饋
書目名稱Data and Applications Security and Privacy XXXIV讀者反饋學(xué)科排名
作者: Culmination 時間: 2025-3-21 22:31 作者: braggadocio 時間: 2025-3-22 02:20 作者: homeostasis 時間: 2025-3-22 07:35 作者: insipid 時間: 2025-3-22 08:59
K. Michielsen,H. De Raedt,T. Kawakatsuaudulent calls at the moment of their establishment, thereby preventing IRSF from happening. Specifically, we investigate the use of Isolation Forests for the detection of frauds before calls are initiated and compare the results to an existing industrial post-mortem anti-fraud solution.作者: commodity 時間: 2025-3-22 16:23
G. Korniss,P. A. Rikvold,M. A. Novotnybehavior of installed applications, however, the methods suggested had limited accuracy. In this study, we propose a machine learning-based method for detecting PUAs. Our approach can be applied on the target endpoint directly and thus can provide protection against PUAs in real-time.作者: commodity 時間: 2025-3-22 18:11
Managing Secure Inter-slice Communication in 5G Network Slice Chainsd properties that the Network Slice Chain must comply with in order to be chosen as a valid path for the traffic to flow through. This way, it respects security constraints and assures inter-slice communication obeying the rules stated in the policy.作者: Hearten 時間: 2025-3-22 21:41
Provably Privacy-Preserving Distributed Data Aggregation in Smart Gridst towards the system, we model the concept and provide a formal proof of its confidentiality properties. We discuss the attacker models of colluding and non-colluding adversaries on the data flow and show how our scheme mitigates these attacks.作者: Constitution 時間: 2025-3-23 02:59 作者: Mnemonics 時間: 2025-3-23 05:32
PUA Detection Based on Bundle Installer Characteristicsbehavior of installed applications, however, the methods suggested had limited accuracy. In this study, we propose a machine learning-based method for detecting PUAs. Our approach can be applied on the target endpoint directly and thus can provide protection against PUAs in real-time.作者: 漂白 時間: 2025-3-23 13:46 作者: insincerity 時間: 2025-3-23 16:34
https://doi.org/10.1007/978-3-642-79991-4s on the NFV stack. Additionally, we mitigate such threats through optimizing the virtual machine (VM) placement with respect to given constraints. The simulation results demonstrate the effectiveness of our solution.作者: colloquial 時間: 2025-3-23 20:31
I. Avgin,A. Boukahil,D. L. Huberrabilities and Exposures (CVE) enumeration. Models for CPS are thus proposed to cover comprehensiveness and usability. A prototype is used to evaluate the feasibility by demonstrating key features of security enumerations for CPS.作者: OGLE 時間: 2025-3-24 01:44
Springer Proceedings in Physicsroduce an access control as a service model for NFV services. The proposed approach can deploy several kinds of access control model policies (e.g. RBAC, ORBAC, ABAC, etc.) for NFV services and can be easily scaled.作者: 幸福愉悅感 時間: 2025-3-24 05:09
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)s on the NFV stack. Additionally, we mitigate such threats through optimizing the virtual machine (VM) placement with respect to given constraints. The simulation results demonstrate the effectiveness of our solution.作者: 現(xiàn)代 時間: 2025-3-24 07:44 作者: 橫截,橫斷 時間: 2025-3-24 11:39 作者: 相容 時間: 2025-3-24 15:04 作者: thalamus 時間: 2025-3-24 20:07
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)network services for multiple tenants on top of the same physical infrastructure. As NFV relies on virtualization, and as an NFV stack typically involves several levels of abstraction and multiple co-resident tenants, this new technology also unavoidably leads to new security threats. In this paper,作者: 充氣球 時間: 2025-3-25 01:33 作者: calumniate 時間: 2025-3-25 04:54 作者: itinerary 時間: 2025-3-25 08:43
Security Enumerations for Cyber-Physical Systems integrate threat information. While traditional IT systems and vulnerabilities are covered by security enumerations, this does not apply to Cyber-Physical Systems?(CPS). In particular, complexity and interdependencies of components within these systems demand for an extension of current enumeration作者: LEER 時間: 2025-3-25 14:46
Inference-Proof Monotonic Query Evaluation and View Generation Reconsideredowner, communicating with a semi-honest partner by means of their message exchanging computing agents according to some agreed interaction protocols. Such protocols include closed-query evaluation and view generation by the information system agent under the control of the information owner, and the作者: 外科醫(yī)生 時間: 2025-3-25 19:00 作者: implore 時間: 2025-3-25 23:05
Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systemse requirements of these applications. DSMSs were developed to efficiently execute continuous queries (CQs) over incoming data. Multiple CQs can be optimized together to form a query network by sharing operators across CQs. DSMSs are also required to enforce access controls over operators according t作者: Limpid 時間: 2025-3-26 00:48 作者: 越自我 時間: 2025-3-26 07:25 作者: 新陳代謝 時間: 2025-3-26 09:11
Non-interactive Private Decision Tree Evaluationcision tree model and a client interested in classifying its private attribute vector using the server’s private model. The goal of the computation is to obtain the classification while preserving the privacy of both—the decision tree and the client input. After the computation, the client learns th作者: 多嘴 時間: 2025-3-26 13:26
Privacy-Preserving Anomaly Detection Using Synthetic Dataa analysis methods. While there have been impressive advances in machine learning and similar domains in recent years, this also gives rise to concerns regarding the protection of personal and otherwise sensitive data, especially if it is to be analysed by third parties, e.g. in collaborative settin作者: 種屬關(guān)系 時間: 2025-3-26 20:02 作者: Prophylaxis 時間: 2025-3-26 21:29
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraudwork in order to make expensive unauthorized phone calls on behalf of someone else. This results in massive phone bills that victims have to pay while number owners earn the money. Current anti-fraud solutions enable the detection of IRSF afterwards by detecting deviations in the overall caller’s ex作者: 表被動 時間: 2025-3-27 02:14
PUA Detection Based on Bundle Installer Characteristicsttempt to increase the application’s user base. When such applications also include functionalities which are added as a means of monetizing the applications and may cause inconvenience to the user or compromise the user’s privacy, they are referred to as potentially unwanted applications (PUAs). Co作者: IRS 時間: 2025-3-27 09:17
Proactively Extracting IoT Device Capabilities: An Application to Smart Homesheir informational specifications to verify their potential threats, even before a device is installed. We apply our approach to the context of a smart home and evaluate its accuracy and efficiency on the devices from three different vendors.作者: Encumber 時間: 2025-3-27 10:18
Inference-Proof Monotonic Query Evaluation and View Generation Reconsideredk, we carefully describe and inspect the underlying function and attack scenario and summarize and analyze basic approaches for controlled interactions within an abstract framework for epistemic states.作者: labile 時間: 2025-3-27 17:04 作者: fallible 時間: 2025-3-27 20:43
Information Flow Security Certification for SPARK Programssensitive data. We also show how SPARK can be extended for realizing MLS systems that invariably need . through the illustration of an application of the method for security analysis of Needham-Schroeder public-key protocol.作者: chandel 時間: 2025-3-27 22:38 作者: agenda 時間: 2025-3-28 06:01 作者: 手段 時間: 2025-3-28 08:52 作者: 親密 時間: 2025-3-28 13:59
Designing a Decision-Support Visualization for Live Digital Forensic Investigations作者: amnesia 時間: 2025-3-28 14:49 作者: 迅速成長 時間: 2025-3-28 21:37
D. P. Landau,K. K. Mon,H.-B. Schüttlerk, we carefully describe and inspect the underlying function and attack scenario and summarize and analyze basic approaches for controlled interactions within an abstract framework for epistemic states.作者: frenzy 時間: 2025-3-29 00:14 作者: LEVY 時間: 2025-3-29 05:04 作者: 高度贊揚 時間: 2025-3-29 09:14
https://doi.org/10.1007/978-3-642-59689-6rhead. The idea is to use fully (somewhat) homomorphic encryption and evaluate the tree on ciphertexts encrypted under the client’s public key. However, since current somewhat homomorphic encryption schemes have high overhead, we combine efficient data representations with different algorithmic opti作者: Scleroderma 時間: 2025-3-29 13:31 作者: sphincter 時間: 2025-3-29 19:36
Conference proceedings 20001st edition principles of differential privacy (DP). With Movielens and Jester datasets, we demonstrate that our method offers a higher prediction accuracy under strong privacy protection compared to existing LDP recommendation methods.作者: 郊外 時間: 2025-3-29 19:45
https://doi.org/10.1007/978-3-030-49669-2access control; artificial intelligence; authentication; computer hardware; computer networks; computer s作者: 英寸 時間: 2025-3-30 00:20 作者: Contend 時間: 2025-3-30 06:22
Data and Applications Security and Privacy XXXIV978-3-030-49669-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 做方舟 時間: 2025-3-30 08:30 作者: Evacuate 時間: 2025-3-30 14:17 作者: gangrene 時間: 2025-3-30 17:03
Springer Proceedings in Physicsd by abstracting away their design complexities and functionalities from the users. However, this abstraction significantly limits a user’s insights on evaluating the true . (i.e., what actions a device can perform) of a device and hence, its potential security and privacy threats. Most existing wor作者: 哥哥噴涌而出 時間: 2025-3-31 00:04 作者: LAY 時間: 2025-3-31 03:14