派博傳思國際中心

標題: Titlebook: Risks and Security of Internet and Systems; 13th International C Akka Zemmari,Mohamed Mosbah,Frédéric Cuppens Conference proceedings 2019 S [打印本頁]

作者: 空隙    時間: 2025-3-21 18:32
書目名稱Risks and Security of Internet and Systems影響因子(影響力)




書目名稱Risks and Security of Internet and Systems影響因子(影響力)學科排名




書目名稱Risks and Security of Internet and Systems網絡公開度




書目名稱Risks and Security of Internet and Systems網絡公開度學科排名




書目名稱Risks and Security of Internet and Systems被引頻次




書目名稱Risks and Security of Internet and Systems被引頻次學科排名




書目名稱Risks and Security of Internet and Systems年度引用




書目名稱Risks and Security of Internet and Systems年度引用學科排名




書目名稱Risks and Security of Internet and Systems讀者反饋




書目名稱Risks and Security of Internet and Systems讀者反饋學科排名





作者: 柔聲地說    時間: 2025-3-21 21:07

作者: PLIC    時間: 2025-3-22 03:38
Fabien Patrick Viertel,Fabian Kortum,Leif Wagner,Kurt Schneidersurface environments (MSE). To support these choices, we conducted a study on how the orientation of a large display used alongside tablets impacts collaboration. Previous research involving only one interactive surface shows that display orientation changes how people interact with the display, the
作者: 很是迷惑    時間: 2025-3-22 06:20
Lyes Bayou,David Espes,Nora Cuppens-Boulahia,Frédéric Cuppenshma action plans (AAP) are written instructions for responding to escalating asthma symptoms. Icons have been used to facilitate the accessibility of health information and we investigate whether they benefit parents of young children. We conducted a 4-part study with 36 participants where we (1) ga
作者: 發(fā)炎    時間: 2025-3-22 10:55

作者: AVANT    時間: 2025-3-22 16:27

作者: 本土    時間: 2025-3-22 18:29
Ivan Marco Lobe Kome,Nora Cuppens-Boulahia,Frédéric Cuppens,Vincent Frey used incorrectly because the underlying statistical concepts are misunderstood. From interviews with students in an HCI lab, we find that, in addition to theoretical knowledge of statistics, novice analysts require statistical know-how, i.e., practical knowledge of how various data characteristics
作者: 和藹    時間: 2025-3-22 23:08
Alberto Bartoli,Andrea De Lorenzo,Eric Medvet,Fabiano Tarlaod appropriate application of those types of methods. However, not all teams, and certainly not all team members, are learned or trained in co-design. This raises challenges not only to the use of co-design methods, but also to its skilful application. This paper reports on an interactive co-design w
作者: 怕失去錢    時間: 2025-3-23 04:51

作者: 投射    時間: 2025-3-23 08:26
Eman Salem Alashwali,Pawel Szalachowski used incorrectly because the underlying statistical concepts are misunderstood. From interviews with students in an HCI lab, we find that, in addition to theoretical knowledge of statistics, novice analysts require statistical know-how, i.e., practical knowledge of how various data characteristics
作者: Champion    時間: 2025-3-23 11:27
Samet Ayta?,Orhan Ermi?,Mehmet Ufuk ?a?layan,Fatih Alag?ztation. We propose a new persuasive system, called ., aimed at helping people to walk with crutches. People with injuries, or with any sort of mobility problem typically use assistive devices such as crutches, walkers or canes in order to be able to walk more independently. However, walking with cru
作者: 急性    時間: 2025-3-23 15:36

作者: inspiration    時間: 2025-3-23 18:48
Damien Crémilleux,Christophe Bidan,Frédéic Majorczyk,Nicolas PrigentThis study investigated the effects of two aspects of web navigation, menu organization and visibility on the eye gaze behaviour, performance and preferences of dyslexic and non-dyslexic participants. Participants undertook four tasks on a website with either unified or fragmented main menu organiza
作者: hematuria    時間: 2025-3-23 22:27

作者: 豎琴    時間: 2025-3-24 05:17

作者: Intruder    時間: 2025-3-24 07:36
Pal-Stefan Murvay,Bogdan Grozaransportation. In bus travel, both user experience of the digital services and the broader service design context of the public transportation need to be addressed. Experience-Driven Design (EDD) can be used to take the passengers’ needs and experiences in the core of the design process. This paper
作者: VALID    時間: 2025-3-24 12:25
Karim Lounis,Mohammad Zulkernineransportation. In bus travel, both user experience of the digital services and the broader service design context of the public transportation need to be addressed. Experience-Driven Design (EDD) can be used to take the passengers’ needs and experiences in the core of the design process. This paper
作者: Laconic    時間: 2025-3-24 18:23

作者: 大溝    時間: 2025-3-24 21:10

作者: 重畫只能放棄    時間: 2025-3-25 01:19
ransportation. In bus travel, both user experience of the digital services and the broader service design context of the public transportation need to be addressed. Experience-Driven Design (EDD) can be used to take the passengers’ needs and experiences in the core of the design process. This paper
作者: 懶鬼才會衰弱    時間: 2025-3-25 06:00

作者: intimate    時間: 2025-3-25 10:48

作者: scrutiny    時間: 2025-3-25 13:27

作者: Folklore    時間: 2025-3-25 17:35

作者: 涂掉    時間: 2025-3-25 21:25
RIICS: Risk Based IICS Segmentation Method,impact, risk levels or other requirements defined by the organization. This paper presents RIICS (.isk based .S .egmentation) a new segmentation method that aims to simplify security zones identification by focusing on systems characteristics that are really relevant for segmentation especially technical industrial specificities and risk.
作者: Headstrong    時間: 2025-3-26 03:18

作者: foreign    時間: 2025-3-26 04:52

作者: indignant    時間: 2025-3-26 11:33

作者: 愚笨    時間: 2025-3-26 13:45
On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper), compliant consent models acceptable to users and OSN providers (data controller). We observe that evaluating privacy risks of consents to data processing activities can be an effective way to help users in their decision to give or refuse consents and hence is an important research direction.
作者: 黑豹    時間: 2025-3-26 19:14

作者: chlorosis    時間: 2025-3-27 00:40
Connection Dumping Vulnerability Affecting Bluetooth Availability,tion deprivation. We demonstrate the occurrences of the attacks on Bluetooth devices made by various manufacturers, running different Bluetooth versions and operating systems, and recommend possible mitigations for them.
作者: 紳士    時間: 2025-3-27 05:00
A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements,ur contribution is two-fold: first, we propose a general template to describe security threats that can be used in the early stages of software development. Second, we define a systematic and semi-automatic procedure to identify relevant threats for a software development project, taking the functionality of the software-to-be into account.
作者: extinguish    時間: 2025-3-27 05:49
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diamodels with textual risk annotations are equally comprehensible to corresponding threat models with graphical risk annotations. With respect to efficiency, however, we found out that participants solving tasks related to the graphical annotations spent on average . less time per task.
作者: conifer    時間: 2025-3-27 12:59
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems, data injection attack detection. It uses a Recurrent Neural Network (RNN) for building a prediction model of expected sensing data. These latter are compared to received values and an alert security is raised if these values differ significantly.
作者: 搖曳    時間: 2025-3-27 13:56
A Certificate-Less Key Exchange Protocol for IoT,ent while maintaining the property of authentication and secrecy. We use the ability of each node to build a private channel to create a shared key, safe from the eye of an attacker. Our solution provides a solution to build a certificate-less trusted ecosystem for IoT.
作者: inventory    時間: 2025-3-27 21:48
0302-9743 curity; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis..978-3-030-12142-6978-3-030-12143-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: Console    時間: 2025-3-28 00:51
0302-9743 SIS 2018, held in Arcachon, France, in October 2018...The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps se
作者: Cytokines    時間: 2025-3-28 03:36
An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence Diaence diagrams. The experiment was carried out on two separate groups where each group solved tasks related to either graphical or textual annotations. We also examined the efficiency of using these two annotations in terms of the average time each group spent per task. Our study reports that threat
作者: 帳單    時間: 2025-3-28 06:28
Are Third-Party Libraries Secure? A Software Library Checker for Java,component; thus if an imported library includes a certain vulnerability, an application could get insecure. Therefore a widespread search for existing security flaws within used libraries is necessary. Big databases like the National Vulnerability Database (NVD) comprise reported security incidents
作者: CULP    時間: 2025-3-28 11:24

作者: Functional    時間: 2025-3-28 14:47
Outsourcing Signatures of Confidential Documents, to securely outsource the signature of a confidential document he owns to a digital signature provider. On the one hand, the client gets a valid standard signature of his confidential document while the signature provider learns nothing more from the document than its digest. On the other hand, the
作者: 雪崩    時間: 2025-3-28 19:51
Trust Evaluation Model for Attack Detection in Social Internet of Things,d objects to interact in order to offer a variety of attractive services and applications. However, with this emerging paradigm, people feel wary and cautious. They worry about revealing their data and violating their privacy. Without trustworthy mechanisms to guarantee the reliability of user’s com
作者: Formidable    時間: 2025-3-28 23:38

作者: eustachian-tube    時間: 2025-3-29 05:25
Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning,ishing campaigns that are increasingly more targeted and last for increasingly shorter life spans. Browser-based phishing detectors that are specialized for a . set of targeted web sites and that are based . on the overall . of a target could be a very effective tool in this respect. Approaches of t
作者: 厭煩    時間: 2025-3-29 10:48
Privacy Preserving Data Offloading Based on Transformation,ution performance, it raises new challenges regarding security. Privacy leakage risks prevent users from sharing their private data with third-party services. State-of-the-art approaches used for secure data storage are cryptography based, having an overhead of key management as well as do not suppo
作者: 刀鋒    時間: 2025-3-29 11:44
DSTC: DNS-Based Strict TLS Configurations,e known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g. non Forward-Secrecy), mainly to provide backward compatibility. This opens doors to downgrade attacks, as is the case of the POODLE attack [.], which exploits the client’s silent fallback to downgrade the p
作者: Addictive    時間: 2025-3-29 16:24

作者: 橫條    時間: 2025-3-29 20:25
On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper),anisms in OSNs are either non-existent or not GDPR compliant. While the absence of consent means a lack of control of the OSN user (data subject) on his personal data, non-compliant consent mechanisms can give them a false sense of control, encouraging them to reveal more personal data than they wou
作者: Diverticulitis    時間: 2025-3-30 00:34
Enhancing Collaboration Between Security Analysts in Security Operations Centers,s paper we explain how a SOC is organized, we highlight the current limitations of SOCs and their consequences regarding the performance of the detection service. We propose a new collaboration process to enhance the cooperation between security analysts in order to quickly process security events a
作者: Omniscient    時間: 2025-3-30 05:44
RIICS: Risk Based IICS Segmentation Method,ping the integrated system secured. Connecting this two totally different networks has numerous benefits and advantages, but introduces several security problems. . is one of the most important security measures that should be applied to integrated ICS systems. This security technique consists essen
作者: 曲解    時間: 2025-3-30 10:12

作者: 靈敏    時間: 2025-3-30 13:09
Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol,cently designed in-vehicle network protocols, e.g., FlexRay, were engineered in thse absence of security concerns and thus they are highly vulnerable to adversarial interventions. In this work, we study the FlexRay protocol specification to identify features that can be used to mount various attacks
作者: CLAY    時間: 2025-3-30 19:44

作者: textile    時間: 2025-3-30 22:53

作者: 媽媽不開心    時間: 2025-3-31 03:31

作者: 注入    時間: 2025-3-31 06:01

作者: Phenothiazines    時間: 2025-3-31 10:14

作者: Communicate    時間: 2025-3-31 17:17
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense,elated work on quantification effectiveness and the impact of a diversification based MTD techniques. Then, we propose a new model that relies mainly on the knowledge that the adversary has about the target system to compute the effectiveness and the impact and also to figure out the optimal MTD diversification of a target system.
作者: 宣傳    時間: 2025-3-31 18:56
978-3-030-12142-6Springer Nature Switzerland AG 2019
作者: Aboveboard    時間: 2025-3-31 23:59





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
深州市| 岳阳市| 平南县| 宣恩县| 崇义县| 中牟县| 七台河市| 陆川县| 永定县| 罗源县| 瑞昌市| 齐河县| 报价| 澄城县| 金阳县| 文登市| 枞阳县| 张北县| 龙川县| 通化县| 佛教| 岫岩| 房山区| 德庆县| 平罗县| 青川县| 朝阳市| 于都县| 孝昌县| 新平| 定陶县| 罗定市| 南宫市| 江油市| 秦皇岛市| 襄城县| 龙川县| 巴东县| 长寿区| 定兴县| 墨江|