派博傳思國際中心

標題: Titlebook: ICT Systems Security and Privacy Protection; 35th IFIP TC 11 Inte Marko H?lbl,Kai Rannenberg,Tatjana Welzer Conference proceedings 2020 IFI [打印本頁]

作者: Opulent    時間: 2025-3-21 18:24
書目名稱ICT Systems Security and Privacy Protection影響因子(影響力)




書目名稱ICT Systems Security and Privacy Protection影響因子(影響力)學科排名




書目名稱ICT Systems Security and Privacy Protection網(wǎng)絡公開度




書目名稱ICT Systems Security and Privacy Protection網(wǎng)絡公開度學科排名




書目名稱ICT Systems Security and Privacy Protection被引頻次




書目名稱ICT Systems Security and Privacy Protection被引頻次學科排名




書目名稱ICT Systems Security and Privacy Protection年度引用




書目名稱ICT Systems Security and Privacy Protection年度引用學科排名




書目名稱ICT Systems Security and Privacy Protection讀者反饋




書目名稱ICT Systems Security and Privacy Protection讀者反饋學科排名





作者: larder    時間: 2025-3-21 20:27

作者: 通便    時間: 2025-3-22 01:49
ICT Systems Security and Privacy Protection978-3-030-58201-2Series ISSN 1868-4238 Series E-ISSN 1868-422X
作者: 鋪子    時間: 2025-3-22 08:18
https://doi.org/10.1007/978-3-030-58201-2access control; artificial intelligence; authentication; communication systems; computer crime; computer
作者: Anticonvulsants    時間: 2025-3-22 11:36
Benjamin Semal,Konstantinos Markantonakis,Raja Naeem Akram,Jan Kalbantner
作者: 相符    時間: 2025-3-22 15:44
Muhammad Asim Mukhtar,Muhammad Khurram Bhatti,Guy Gogniat
作者: 話    時間: 2025-3-22 20:59
Ricardo Moura,David R. Matos,Miguel L. Pardal,Miguel Correia
作者: enflame    時間: 2025-3-22 21:14

作者: Collision    時間: 2025-3-23 05:20
Stefan Carl Peiser,Ludwig Friborg,Riccardo Scandariato
作者: induct    時間: 2025-3-23 08:57
Can Yang,Jian Liu,Mengxia Luo,Xiaorui Gong,Baoxu Liu
作者: 跳動    時間: 2025-3-23 10:29

作者: inhumane    時間: 2025-3-23 15:12
Michael Eckel,Andreas Fuchs,Jürgen Repp,Markus Springer
作者: 槍支    時間: 2025-3-23 19:26
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systemsy. Both attacks are implemented on cross-core configurations. Furthermore, the cross-VM covert channel is successfully tested across three different Intel microarchitectures. Finally, a comparison against state-of-the-art covert channel attacks is provided, along with a discussion on potential mitig
作者: 的是兄弟    時間: 2025-3-24 02:14

作者: custody    時間: 2025-3-24 05:31

作者: 原始    時間: 2025-3-24 08:29
Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingg module do understand the password creation guidelines to a higher degree than other users. Further, the experiment shows that users presented with password guidelines in the form of a CBMT learning module do create passwords that are longer and more secure than other users. The assessment of passw
作者: 剛毅    時間: 2025-3-24 13:06

作者: hair-bulb    時間: 2025-3-24 17:15
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embeddinghich can automatically align the trunk routine of assembly codes. We evaluated RouAlign on 65 groups of real-world programs, with over two million functions. RouAlign outperforms state-of-the-art binary comparing solutions by over 35% with a high precision of 92% on average in pairwise function reco
作者: Meander    時間: 2025-3-24 21:14
Code Between the Lines: Semantic Analysis of Android Applications arbitrary applications, our system can predict precise, human-readable keywords and short phrases that indicate the main use-cases apps are designed for..We evaluate our solution on 67,040 real-world apps and find that with a precision between 69% and 84% we can identify keywords that also occur in
作者: 管理員    時間: 2025-3-24 23:13

作者: STING    時間: 2025-3-25 06:37
1868-4238 on, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic...The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and
作者: 巧思    時間: 2025-3-25 09:03
: Secure Communication Channels with Cipher Suite Diversitydiscovered. . creates a secure communication channel through the encapsulation of . TLS channels, where each one uses a different cipher suite. We evaluated the performance of . and concluded that it has the advantage of being easy to use and maintain since it does not modify any of its dependencies.
作者: 表否定    時間: 2025-3-25 13:04
JavaScript Malware Detection Using Locality Sensitive HashingSDHASH. The results show a high prediction accuracy, as well as low false positive and negative rates. These results show that LSH based neural networks are a competitive option against other state-of-the-art JavaScript malware classification solutions.
作者: sparse    時間: 2025-3-25 18:03

作者: 跟隨    時間: 2025-3-25 21:23
: Pay More Attention to External Links in ures are generated by merging histograms of three image color channels. Then . examines the script through tracking and classifying the related images. The detector achieves more than 95% precision in 9,589 high-definition images.
作者: 讓你明白    時間: 2025-3-26 02:28

作者: 襲擊    時間: 2025-3-26 05:33

作者: BIBLE    時間: 2025-3-26 11:16

作者: Neonatal    時間: 2025-3-26 12:57
Refined Detection of SSH Brute-Force Attackers Using Machine Learning evaluation of captured real traffic, manually prepared legitimate SSH traffic with characteristics similar to BF attacks, and, finally, using a packet trace with SSH logs from real production servers.
作者: 微塵    時間: 2025-3-26 19:46

作者: esthetician    時間: 2025-3-26 21:15
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systemsrently, conflicts in memory resource occur, resulting in observable timing variations during execution. Malicious tenants can intentionally manipulate the hardware platform to devise a covert channel, enabling them to steal the data of co-residing tenants. This paper presents two new microarchitectu
作者: CHARM    時間: 2025-3-27 02:10
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channelsion. However, detecting the leakage of sensitive information in networked systems is still a challenging problem, especially when adversaries use covert channels to exfiltrate sensitive information to unauthorized parties. Presently, approaches for detecting timing-based covert channels have been st
作者: ambivalence    時間: 2025-3-27 05:51
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Evictionets by observing cache lines evicted by the co-running applications. A precondition for such attacks is that the attacker needs a set of cache lines mapped to memory addresses belonging to victim, called .. Attacker learns eviction set by loading the cache lines at random and then it observes their
作者: 植物學    時間: 2025-3-27 12:23
Refined Detection of SSH Brute-Force Attackers Using Machine Learningwork traffic analysis to identify attackers. Recent papers describe how to detect BF attacks using pure NetFlow data. However, our evaluation shows significant false-positive (FP) results of the current solution. To overcome the issue of high FP rate, we propose a machine learning (ML) approach to d
作者: Champion    時間: 2025-3-27 14:15

作者: Volatile-Oils    時間: 2025-3-27 20:19

作者: 我不明白    時間: 2025-3-28 01:06
Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingwords. Rather than a technical enforcing measure, CBMT is a framework that provides information security training to users when they are in a situation where the training is directly relevant. The study is carried out in two steps. First, a survey is used to measure how well users understand passwor
作者: Gudgeon    時間: 2025-3-28 05:49
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design privacy policies, we are rarely aware of processing practices. Drawing on multidisciplinary research, we postulate that privacy policies presenting information in a way that triggers affective responses, together with individual characteristics, may influence privacy attitudes. Through an online qu
作者: Bricklayer    時間: 2025-3-28 09:35

作者: evasive    時間: 2025-3-28 12:24
JavaScript Malware Detection Using Locality Sensitive HashingvaScript malware through static analysis. An experiment is conducted using a dataset containing 1.5M evenly distributed benign and malicious samples provided by the anti-malware company Cyren. Four different locality sensitive hashing algorithms are tested and evaluated: Nilsimsa, ssdeep, TLSH, and
作者: 玩笑    時間: 2025-3-28 17:55
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embeddinghunting, etc. Cross-version function identification and subroutine matching would greatly release manpower by indicating the known parts coming from different binary programs. Existing approaches mainly focus on function recognition ignoring the recovery of the relationships between functions, which
作者: Scleroderma    時間: 2025-3-28 21:31
Code Between the Lines: Semantic Analysis of Android Applicationsons. As it is often not obvious in which context problematic statements occur, it is challenging to assess their practical impact. While some flaws may turn out to be bad practice but not undermine the overall security level, others could have a serious impact. Distinguishing them requires knowledge
作者: 大廳    時間: 2025-3-29 02:35

作者: 擔憂    時間: 2025-3-29 07:09
Secure Attestation of Virtualized Environments technology in terms of flexibility, scalability, cost-effectiveness, and availability. Applications range from network and embedded devices to big data centers and cloud computing. Trusted Computing technology can be employed to protect the integrity of a system by leveraging a Trusted Platform Mod
作者: gnarled    時間: 2025-3-29 09:15

作者: Demulcent    時間: 2025-3-29 11:48
0065-2598 our knowledge on transmembrane signalling mechanism has increased almost exponentially and this great stride has been linking areas of biology that had been previously considered of as being separate. The Second Hiroshima International Neurotransmitter Receptor Symposium was held on October 6 to 9
作者: Chameleon    時間: 2025-3-29 17:49

作者: 調(diào)整    時間: 2025-3-29 23:08
Integrating Central and Eastern Europe into the European Union: The Monetary Dimension,European countries, namely Bulgaria, the Czech Republic, Estonia, Hungary, Latvia, Lithuania, Poland, Romania, Slovakia and Slovenia. After a decision of the European Council in Luxembourg in December 1997, accession negotiations with a number of candidate countries will presumably start in the spring of 1998.
作者: 輕快走過    時間: 2025-3-30 01:24

作者: byline    時間: 2025-3-30 05:18
Yajun Li,Changyun Wei,Yu Xia exploit the idle periods of the other nodes. Using the regenerative approach we obtain the necessary conditions of the ergodicity of our system, and show that these conditions have a clear probabilistic interpretation. We also suggest a sufficient stability condition. Simulation experiments show th
作者: 沒收    時間: 2025-3-30 10:35

作者: Stress-Fracture    時間: 2025-3-30 15:18

作者: 廣告    時間: 2025-3-30 20:04
Einleitung,Die ., wobei nachfolgende überlegungen im vorliegenden essential gleicherma?en für . sowie für interessierte . relevant sind. Das folgende Grundverst?ndnis in Anlehnung an den WBGU (2019) ist hierfür einführend hilfreich.
作者: Fraudulent    時間: 2025-3-30 21:04
Sprachvermittlung in den Sozialen Medien978-3-503-20922-4Series ISSN 2751-2517 Series E-ISSN 2731-8621
作者: 切碎    時間: 2025-3-31 04:44
A Jump-Start of Non-negative Least Squares Solvers,ctive set methods. Two quantitative measurements are introduced to evaluate the quality of initial settings for active set method. Experimental results indicate that the proposed initialization provides a good jump-start for the active set method leading to a reduction of the number of iterations of active set methods.




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
葵青区| 云安县| 河津市| 清涧县| 上思县| 紫金县| 色达县| 揭东县| 襄汾县| 太白县| 崇义县| 闻喜县| 麻江县| 运城市| 嘉祥县| 嵩明县| 绥化市| 莎车县| 濮阳县| 长寿区| 阳山县| 大冶市| 汉源县| 满城县| 江门市| 车险| 长春市| 方城县| 儋州市| 阳江市| 游戏| 天镇县| 连城县| 潞西市| 若尔盖县| 徐水县| 吉安市| 湄潭县| 东平县| 翁牛特旗| 山东省|