標(biāo)題: Titlebook: Risks and Security of Internet and Systems; 17th International C Slim Kallel,Mohamed Jmaiel,Nora Cuppens Conference proceedings 2023 The Ed [打印本頁] 作者: VER 時間: 2025-3-21 19:19
書目名稱Risks and Security of Internet and Systems影響因子(影響力)
書目名稱Risks and Security of Internet and Systems影響因子(影響力)學(xué)科排名
書目名稱Risks and Security of Internet and Systems網(wǎng)絡(luò)公開度
書目名稱Risks and Security of Internet and Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Risks and Security of Internet and Systems被引頻次
書目名稱Risks and Security of Internet and Systems被引頻次學(xué)科排名
書目名稱Risks and Security of Internet and Systems年度引用
書目名稱Risks and Security of Internet and Systems年度引用學(xué)科排名
書目名稱Risks and Security of Internet and Systems讀者反饋
書目名稱Risks and Security of Internet and Systems讀者反饋學(xué)科排名
作者: HALO 時間: 2025-3-21 23:55 作者: 縮短 時間: 2025-3-22 01:50 作者: 整潔漂亮 時間: 2025-3-22 08:28 作者: 議程 時間: 2025-3-22 10:20 作者: 大笑 時間: 2025-3-22 14:13 作者: 摸索 時間: 2025-3-22 17:18 作者: 遠(yuǎn)足 時間: 2025-3-22 22:39
Mohamed Amin Hammami,Mariam Lahami,Afef Jmal Maalejintegration of e-mail in the public sector has certainly brought citizens and handling officers closer, it has also introduced a particular vision on governmental authorities such as for instance the idea that public service and information should be available to citizens any time, anywhere. Such a 作者: 別炫耀 時間: 2025-3-23 03:02
Tarek Frikha,Jalel Ktari,Habib Hamamintegration of e-mail in the public sector has certainly brought citizens and handling officers closer, it has also introduced a particular vision on governmental authorities such as for instance the idea that public service and information should be available to citizens any time, anywhere. Such a 作者: grudging 時間: 2025-3-23 05:56 作者: 減弱不好 時間: 2025-3-23 13:09
Racem Bougacha,Régine Laleau,Philippe Bon,Simon Collart-Dutilleul,Rahma Ben Ayedother and they become commodity in an instant. In these new web communications, the natural and intelligible interaction corresponding to the user’s various demands is required. In the communication in which persons do the direct dialogue in the interaction not only on the web but also in real world作者: 令人作嘔 時間: 2025-3-23 14:06
Benjamin Somers,Fabien Dagnat,Jean-Christophe Bachting, CogTool lacks the necessary (modeling baseline) observed human performance data to allow it to make accurate predictions about mobile phone use. To address this problem, we needed to collect performance data from both novice users’ and expert users’ interactions to plug into CogTool. Whilst no作者: Arbitrary 時間: 2025-3-23 21:09
Johannes Beckert,Teo Blazevic,Alexander Dobhanting, CogTool lacks the necessary (modeling baseline) observed human performance data to allow it to make accurate predictions about mobile phone use. To address this problem, we needed to collect performance data from both novice users’ and expert users’ interactions to plug into CogTool. Whilst no作者: 咒語 時間: 2025-3-24 01:12
Liang Chen,Cheng Zeng,Stilianos Vidalisting, CogTool lacks the necessary (modeling baseline) observed human performance data to allow it to make accurate predictions about mobile phone use. To address this problem, we needed to collect performance data from both novice users’ and expert users’ interactions to plug into CogTool. Whilst no作者: 條街道往前推 時間: 2025-3-24 04:12
Rahma Trabelsi,Ghofrane Fersi,Mohamed Jmaielvices while doing other things. These users might be highly engaged within a mobile experience or unfulfilled by their real world experience; but significantly, their frequent usage could also be a form of vigilant behavior. This research seeks to understand whether or not mobile usage leads to an i作者: Vulnerable 時間: 2025-3-24 08:43
Hannes Salinvices while doing other things. These users might be highly engaged within a mobile experience or unfulfilled by their real world experience; but significantly, their frequent usage could also be a form of vigilant behavior. This research seeks to understand whether or not mobile usage leads to an i作者: Ondines-curse 時間: 2025-3-24 11:48 作者: 仔細(xì)檢查 時間: 2025-3-24 18:17
rning system model to support a high level of technique learning, such as “tacit knowledge” and “proficient art” in nursing skills, which have been heretofore learned only from experience. This e-learning system enables self-learning in addition to intellectual learning, thereby enhancing knowledge 作者: 聯(lián)邦 時間: 2025-3-24 21:06
0302-9743 ch took place in Sousse, Tunesia, during December 7-9, 2022.. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems.978-3-031-31107-9978-3-031-311作者: judicial 時間: 2025-3-25 00:01
,Context Correlation for?Automated Dynamic Android App Analysis to?Improve Impact Rating of?Privacy flaws is often limited. Static approaches lack runtime information and dynamic analysis miss program structure information. We aim to build a dynamic analysis environment and rate the flaw impact based on the data flow context. We correlate the traced API call chains with data sources and sinks of p作者: 江湖郎中 時間: 2025-3-25 07:14
,Errors in?the?CICIDS2017 Dataset and?the?Significant Differences in?Detection Performances It Makesto malicious and benign classes. The labelling correctness is paramount for the quality of the evaluation of intrusion detection systems but is often considered as the ground truth by practitioners and is rarely verified. Another difficulty lies in the correct capture of the network packets. If it i作者: 舊病復(fù)發(fā) 時間: 2025-3-25 10:14
,A Comparative Study of?Attribute Selection Algorithms on?Intrusion Detection System in?UAVs: A Caseion detection in UAVs to distinguish between abnormal and normal behaviors. The feature selection process in datasets is essential in improving IDSs performance. Decreasing features reduces the complexity of the storage and executive load. This paper investigates the influence of feature selection I作者: ZEST 時間: 2025-3-25 12:12
,PRIAH: Private Alerts in?Healthcare, between different persons and services. Many solutions are currently implemented for privacy preservation, mainly for EHR (Electronic Health Record) data exchange and storage. Nevertheless, when dealing with electronic alerts about the patient’s emergent health state, current systems still suffer f作者: MARS 時間: 2025-3-25 16:05
,Tool Paper - SEMA: Symbolic Execution Toolchain for?Malware Analysis,ols to detect malware signatures. Unfortunately, most of those tools are helpless when coming to automatic detection of polymorphic malwares, i.e., malware signature variants belonging to the same family. Recent work propose to handle those difficulties with symbolic execution and machine learning. 作者: 竊喜 時間: 2025-3-25 22:57 作者: 中和 時間: 2025-3-26 01:32 作者: 無底 時間: 2025-3-26 07:10 作者: Malcontent 時間: 2025-3-26 10:32
Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups, 2 Rollups. It would reduce fees paid by its users and help make its cryptocurrency a deflationary currency by burning a certain amount of it during operations. However, this modification does not only bring advantages. In this paper, we conduct a practical study to show how it affects the transacti作者: Hippocampus 時間: 2025-3-26 13:28 作者: Credence 時間: 2025-3-26 18:28
,Security Analysis: From Model to?System Analysis,r, to make a cyber-physical system more resilient and discover possible attack scenarios, it is necessary to analyze systems by taking into account their interactions with their environment. Standard formal analysis approaches are based on a model of the system. From a quantitative and qualitative p作者: 比賽用背帶 時間: 2025-3-27 00:01 作者: 名字的誤用 時間: 2025-3-27 03:39
,How IT Infrastructures Break: Better Modeling for?Better Risk Management,ical and organizational domains. Risk management is therefore essential to ensure infrastructure resilience, compliance with legal and contractual requirements and a better knowledge of what causes what. But risk management is hard to automate, sometimes because criteria are subject to human appreci作者: 倒轉(zhuǎn) 時間: 2025-3-27 06:34
IoT Security Within Small and Medium-Sized Manufacturing Companies,all and medium-sized companies (SMEs). Along with the technical innovations, especially in the environment of cloud based IoT solutions, the topic of IoT security is gaining outstanding importance. This paper presents a pre-study and investigation of the experience, awareness, activities, and knowle作者: 提名 時間: 2025-3-27 13:15
,An Incentive Mechanism for?Managing Obligation Delegation,rt of security policies, which specify what actions a user is obliged to perform in the future. One interesting feature of obligations is unenforceable, that is, the system cannot guarantee that each obligation will be fulfilled. Indeed, obligations go unfulfilled for a variety of reasons. For examp作者: 絕緣 時間: 2025-3-27 16:56 作者: 大喘氣 時間: 2025-3-27 18:05
,Pseudonym Swapping with?Secure Accumulators and?Double Diffie-Hellman Rounds in?Cooperative Intellian adversary can link a certain vehicle to a geographical bounded area or usage of services, there is a need to protect the vehicle’s real identity, but at the same time being able to prove its existence at a later stage due to auditing. We propose a pseudonym swapping protocol aligned with a new se作者: Airtight 時間: 2025-3-28 01:00 作者: 繁榮中國 時間: 2025-3-28 02:19 作者: 圣歌 時間: 2025-3-28 07:02
,Pseudonym Swapping with?Secure Accumulators and?Double Diffie-Hellman Rounds in?Cooperative Intellicurity architecture where signature keys are stored in both a typical secure hardware module and in a secure accumulator that provides proof for key validity. We propose minor adjustments to the current ETSI standard to include such secure setup and provide a comparative proof of concept implementation between two variants of secure accumulators.作者: ELUC 時間: 2025-3-28 12:54
Conference proceedings 2023ace in Sousse, Tunesia, during December 7-9, 2022.. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems.作者: Indebted 時間: 2025-3-28 14:34 作者: 影響 時間: 2025-3-28 22:05 作者: Optic-Disk 時間: 2025-3-29 02:32
,Errors in?the?CICIDS2017 Dataset and?the?Significant Differences in?Detection Performances It Makessent several flaws we identified in the labelling of the CICIDS2017 dataset and in the traffic capture, such as packet misorder, packet duplication and attack that were performed but not correctly labelled. Finally, we assess the impact of these different corrections on the evaluation of supervised intrusion detection approaches.作者: 逃避現(xiàn)實 時間: 2025-3-29 04:30 作者: Innovative 時間: 2025-3-29 09:21
,Towards a?Secure Cross-Blockchain Smart Contract Architecture,t Contracts (SCs) across BCs. In this context, we present in this paper an extension of Bifr?st architecture enabling secure cross-BC SCs using the Trusted Execution Environment (TEE). The proposed architecture is also fault tolerant by means of a logging module that facilitates the recovery of partially completed transactions in case of a crash.作者: 征服 時間: 2025-3-29 12:58 作者: FELON 時間: 2025-3-29 17:37
,A Comparative Study of?Attribute Selection Algorithms on?Intrusion Detection System in?UAVs: A Casen two scenarios (15 and 20 features). The evaluation demonstrates that our model achieves better accuracy (99.93.). Consequently, reducing the number of features reduces memory size and CPU time needed for intrusion detection.作者: Exposure 時間: 2025-3-29 22:30
,Blockchain Survey for?Security and?Privacy in?the?e-Health Ecosystem,nd intuitive insights into concepts, requirements, development, and deployment technologies for healthcare professionals and system designers interested in adopting blockchain to maintain the security and privacy of healthcare systems.作者: Creditee 時間: 2025-3-30 00:21 作者: Oration 時間: 2025-3-30 05:41 作者: 古代 時間: 2025-3-30 09:29 作者: FID 時間: 2025-3-30 13:06
978-3-031-31107-9The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: Range-Of-Motion 時間: 2025-3-30 18:34
Risks and Security of Internet and Systems978-3-031-31108-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: FISC 時間: 2025-3-30 23:03 作者: 催眠藥 時間: 2025-3-31 01:20
tic overview and discussion of recent works combining AR/VR with BIM are not yet fully covered. Therefore, this paper systematically reviews recent approaches combining AR/VR with BIM and categorizes the literature by the building’s lifecycle phase while systematically describing relevant use cases.作者: osteocytes 時間: 2025-3-31 08:35 作者: 凈禮 時間: 2025-3-31 11:42
Maxime Lanvin,Pierre-Fran?ois Gimenez,Yufei Han,Frédéric Majorczyk,Ludovic Mé,éric Totelotential to lower the social threshold of using activity spaces. However, the participants were concerned about their privacy and the intrusiveness of technology. The?findings?contribute to the research of sustainable technologies for supporting shared spaces and activities in urban residents’ local作者: 跑過 時間: 2025-3-31 13:26 作者: 實現(xiàn) 時間: 2025-3-31 20:39 作者: 來自于 時間: 2025-3-31 22:00 作者: confederacy 時間: 2025-4-1 03:39
Maher Boughdiri,Takoua Abdellatif,Tesnim Abdellatifr and OPSL?in the typical conference environment but not in the poster presentation environment. In addition, an analysis by Lasso was conducted to examine the relationship between OPSL and these indicators and found that three indicators relating to participants’ conversation behavior were selected作者: 防止 時間: 2025-4-1 10:03
Mohamed Amin Hammami,Mariam Lahami,Afef Jmal Maalejgovernmental authority dealing with 500,000 emails per year on top of face-to face meetings, phone calls and chat communication. With the objective of creating an e-mail client capable to ease and ensure the quality of SSIAs’ handling officers public service, we have developed a prototype that: (1)