標題: Titlebook: ICT Systems Security and Privacy Protection; 35th IFIP TC 11 Inte Marko H?lbl,Kai Rannenberg,Tatjana Welzer Conference proceedings 2020 IFI [打印本頁] 作者: Opulent 時間: 2025-3-21 18:24
書目名稱ICT Systems Security and Privacy Protection影響因子(影響力)
書目名稱ICT Systems Security and Privacy Protection影響因子(影響力)學科排名
書目名稱ICT Systems Security and Privacy Protection網(wǎng)絡公開度
書目名稱ICT Systems Security and Privacy Protection網(wǎng)絡公開度學科排名
書目名稱ICT Systems Security and Privacy Protection被引頻次
書目名稱ICT Systems Security and Privacy Protection被引頻次學科排名
書目名稱ICT Systems Security and Privacy Protection年度引用
書目名稱ICT Systems Security and Privacy Protection年度引用學科排名
書目名稱ICT Systems Security and Privacy Protection讀者反饋
書目名稱ICT Systems Security and Privacy Protection讀者反饋學科排名
作者: larder 時間: 2025-3-21 20:27 作者: 通便 時間: 2025-3-22 01:49
ICT Systems Security and Privacy Protection978-3-030-58201-2Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: 鋪子 時間: 2025-3-22 08:18
https://doi.org/10.1007/978-3-030-58201-2access control; artificial intelligence; authentication; communication systems; computer crime; computer 作者: Anticonvulsants 時間: 2025-3-22 11:36
Benjamin Semal,Konstantinos Markantonakis,Raja Naeem Akram,Jan Kalbantner作者: 相符 時間: 2025-3-22 15:44
Muhammad Asim Mukhtar,Muhammad Khurram Bhatti,Guy Gogniat作者: 話 時間: 2025-3-22 20:59
Ricardo Moura,David R. Matos,Miguel L. Pardal,Miguel Correia作者: enflame 時間: 2025-3-22 21:14 作者: Collision 時間: 2025-3-23 05:20
Stefan Carl Peiser,Ludwig Friborg,Riccardo Scandariato作者: induct 時間: 2025-3-23 08:57
Can Yang,Jian Liu,Mengxia Luo,Xiaorui Gong,Baoxu Liu作者: 跳動 時間: 2025-3-23 10:29 作者: inhumane 時間: 2025-3-23 15:12
Michael Eckel,Andreas Fuchs,Jürgen Repp,Markus Springer作者: 槍支 時間: 2025-3-23 19:26
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systemsy. Both attacks are implemented on cross-core configurations. Furthermore, the cross-VM covert channel is successfully tested across three different Intel microarchitectures. Finally, a comparison against state-of-the-art covert channel attacks is provided, along with a discussion on potential mitig作者: 的是兄弟 時間: 2025-3-24 02:14 作者: custody 時間: 2025-3-24 05:31 作者: 原始 時間: 2025-3-24 08:29
Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingg module do understand the password creation guidelines to a higher degree than other users. Further, the experiment shows that users presented with password guidelines in the form of a CBMT learning module do create passwords that are longer and more secure than other users. The assessment of passw作者: 剛毅 時間: 2025-3-24 13:06 作者: hair-bulb 時間: 2025-3-24 17:15
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embeddinghich can automatically align the trunk routine of assembly codes. We evaluated RouAlign on 65 groups of real-world programs, with over two million functions. RouAlign outperforms state-of-the-art binary comparing solutions by over 35% with a high precision of 92% on average in pairwise function reco作者: Meander 時間: 2025-3-24 21:14
Code Between the Lines: Semantic Analysis of Android Applications arbitrary applications, our system can predict precise, human-readable keywords and short phrases that indicate the main use-cases apps are designed for..We evaluate our solution on 67,040 real-world apps and find that with a precision between 69% and 84% we can identify keywords that also occur in作者: 管理員 時間: 2025-3-24 23:13 作者: STING 時間: 2025-3-25 06:37
1868-4238 on, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic...The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and 作者: 巧思 時間: 2025-3-25 09:03
: Secure Communication Channels with Cipher Suite Diversitydiscovered. . creates a secure communication channel through the encapsulation of . TLS channels, where each one uses a different cipher suite. We evaluated the performance of . and concluded that it has the advantage of being easy to use and maintain since it does not modify any of its dependencies.作者: 表否定 時間: 2025-3-25 13:04
JavaScript Malware Detection Using Locality Sensitive HashingSDHASH. The results show a high prediction accuracy, as well as low false positive and negative rates. These results show that LSH based neural networks are a competitive option against other state-of-the-art JavaScript malware classification solutions.作者: sparse 時間: 2025-3-25 18:03 作者: 跟隨 時間: 2025-3-25 21:23
: Pay More Attention to External Links in ures are generated by merging histograms of three image color channels. Then . examines the script through tracking and classifying the related images. The detector achieves more than 95% precision in 9,589 high-definition images.作者: 讓你明白 時間: 2025-3-26 02:28 作者: 襲擊 時間: 2025-3-26 05:33 作者: BIBLE 時間: 2025-3-26 11:16 作者: Neonatal 時間: 2025-3-26 12:57
Refined Detection of SSH Brute-Force Attackers Using Machine Learning evaluation of captured real traffic, manually prepared legitimate SSH traffic with characteristics similar to BF attacks, and, finally, using a packet trace with SSH logs from real production servers.作者: 微塵 時間: 2025-3-26 19:46 作者: esthetician 時間: 2025-3-26 21:15
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systemsrently, conflicts in memory resource occur, resulting in observable timing variations during execution. Malicious tenants can intentionally manipulate the hardware platform to devise a covert channel, enabling them to steal the data of co-residing tenants. This paper presents two new microarchitectu作者: CHARM 時間: 2025-3-27 02:10
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channelsion. However, detecting the leakage of sensitive information in networked systems is still a challenging problem, especially when adversaries use covert channels to exfiltrate sensitive information to unauthorized parties. Presently, approaches for detecting timing-based covert channels have been st作者: ambivalence 時間: 2025-3-27 05:51
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Evictionets by observing cache lines evicted by the co-running applications. A precondition for such attacks is that the attacker needs a set of cache lines mapped to memory addresses belonging to victim, called .. Attacker learns eviction set by loading the cache lines at random and then it observes their 作者: 植物學 時間: 2025-3-27 12:23
Refined Detection of SSH Brute-Force Attackers Using Machine Learningwork traffic analysis to identify attackers. Recent papers describe how to detect BF attacks using pure NetFlow data. However, our evaluation shows significant false-positive (FP) results of the current solution. To overcome the issue of high FP rate, we propose a machine learning (ML) approach to d作者: Champion 時間: 2025-3-27 14:15 作者: Volatile-Oils 時間: 2025-3-27 20:19 作者: 我不明白 時間: 2025-3-28 01:06
Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingwords. Rather than a technical enforcing measure, CBMT is a framework that provides information security training to users when they are in a situation where the training is directly relevant. The study is carried out in two steps. First, a survey is used to measure how well users understand passwor作者: Gudgeon 時間: 2025-3-28 05:49
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design privacy policies, we are rarely aware of processing practices. Drawing on multidisciplinary research, we postulate that privacy policies presenting information in a way that triggers affective responses, together with individual characteristics, may influence privacy attitudes. Through an online qu作者: Bricklayer 時間: 2025-3-28 09:35 作者: evasive 時間: 2025-3-28 12:24
JavaScript Malware Detection Using Locality Sensitive HashingvaScript malware through static analysis. An experiment is conducted using a dataset containing 1.5M evenly distributed benign and malicious samples provided by the anti-malware company Cyren. Four different locality sensitive hashing algorithms are tested and evaluated: Nilsimsa, ssdeep, TLSH, and 作者: 玩笑 時間: 2025-3-28 17:55
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embeddinghunting, etc. Cross-version function identification and subroutine matching would greatly release manpower by indicating the known parts coming from different binary programs. Existing approaches mainly focus on function recognition ignoring the recovery of the relationships between functions, which作者: Scleroderma 時間: 2025-3-28 21:31
Code Between the Lines: Semantic Analysis of Android Applicationsons. As it is often not obvious in which context problematic statements occur, it is challenging to assess their practical impact. While some flaws may turn out to be bad practice but not undermine the overall security level, others could have a serious impact. Distinguishing them requires knowledge作者: 大廳 時間: 2025-3-29 02:35 作者: 擔憂 時間: 2025-3-29 07:09
Secure Attestation of Virtualized Environments technology in terms of flexibility, scalability, cost-effectiveness, and availability. Applications range from network and embedded devices to big data centers and cloud computing. Trusted Computing technology can be employed to protect the integrity of a system by leveraging a Trusted Platform Mod作者: gnarled 時間: 2025-3-29 09:15 作者: Demulcent 時間: 2025-3-29 11:48
0065-2598 our knowledge on transmembrane signalling mechanism has increased almost exponentially and this great stride has been linking areas of biology that had been previously considered of as being separate. The Second Hiroshima International Neurotransmitter Receptor Symposium was held on October 6 to 9 作者: Chameleon 時間: 2025-3-29 17:49 作者: 調(diào)整 時間: 2025-3-29 23:08
Integrating Central and Eastern Europe into the European Union: The Monetary Dimension,European countries, namely Bulgaria, the Czech Republic, Estonia, Hungary, Latvia, Lithuania, Poland, Romania, Slovakia and Slovenia. After a decision of the European Council in Luxembourg in December 1997, accession negotiations with a number of candidate countries will presumably start in the spring of 1998.作者: 輕快走過 時間: 2025-3-30 01:24 作者: byline 時間: 2025-3-30 05:18
Yajun Li,Changyun Wei,Yu Xia exploit the idle periods of the other nodes. Using the regenerative approach we obtain the necessary conditions of the ergodicity of our system, and show that these conditions have a clear probabilistic interpretation. We also suggest a sufficient stability condition. Simulation experiments show th作者: 沒收 時間: 2025-3-30 10:35 作者: Stress-Fracture 時間: 2025-3-30 15:18 作者: 廣告 時間: 2025-3-30 20:04
Einleitung,Die ., wobei nachfolgende überlegungen im vorliegenden essential gleicherma?en für . sowie für interessierte . relevant sind. Das folgende Grundverst?ndnis in Anlehnung an den WBGU (2019) ist hierfür einführend hilfreich.作者: Fraudulent 時間: 2025-3-30 21:04
Sprachvermittlung in den Sozialen Medien978-3-503-20922-4Series ISSN 2751-2517 Series E-ISSN 2731-8621 作者: 切碎 時間: 2025-3-31 04:44
A Jump-Start of Non-negative Least Squares Solvers,ctive set methods. Two quantitative measurements are introduced to evaluate the quality of initial settings for active set method. Experimental results indicate that the proposed initialization provides a good jump-start for the active set method leading to a reduction of the number of iterations of active set methods.