標題: Titlebook: Ubiquitous Security; Second International Guojun Wang,Kim-Kwang Raymond Choo,Ernesto Damiani Conference proceedings 2023 The Editor(s) (if [打印本頁] 作者: 會議記錄 時間: 2025-3-21 17:06
書目名稱Ubiquitous Security影響因子(影響力)
書目名稱Ubiquitous Security影響因子(影響力)學科排名
書目名稱Ubiquitous Security網(wǎng)絡公開度
書目名稱Ubiquitous Security網(wǎng)絡公開度學科排名
書目名稱Ubiquitous Security被引頻次
書目名稱Ubiquitous Security被引頻次學科排名
書目名稱Ubiquitous Security年度引用
書目名稱Ubiquitous Security年度引用學科排名
書目名稱Ubiquitous Security讀者反饋
書目名稱Ubiquitous Security讀者反饋學科排名
作者: sinoatrial-node 時間: 2025-3-21 20:34 作者: 薄膜 時間: 2025-3-22 01:38
Conference proceedings 2023 2022..The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers..作者: 畫布 時間: 2025-3-22 08:10 作者: ambivalence 時間: 2025-3-22 09:34
978-981-99-0271-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: Hirsutism 時間: 2025-3-22 15:54 作者: 橫條 時間: 2025-3-22 17:46 作者: 遺留之物 時間: 2025-3-23 00:47
Shitao Wang,Wenjun Jiang,Shuhong ChenIhnen allen ein herzliches Willkommen zum 17. H?mophilie-Symposion. Ich freue mich, Sie wieder in Hamburg begrü?en zu k?nnen und wünsche uns allen eine erfolgreiche Tagung wie auch einige erholsame Stunden der Entspannung in unserer sp?therbstlichen Stadt.作者: nominal 時間: 2025-3-23 03:07
Khalid Hamid,Muhammad Waseem Iqbal,Muhammad Aqeel,Xiangyong Liu,Muhammad ArifIch hei?e Sie auch im Namen von Herrn Prof. MARX herzlich willkommen in Hamburg zum 18. H?mophilie-Symposion und zur nunmehr 8. Veranstaltung seit Frühjahr 1983 über H?mophilie und therapiebedingte HIV-Infektion, wenn wir die zus?tzlichen Rundtischgespr?che einbeziehen (Tabelle 1).作者: 仔細檢查 時間: 2025-3-23 07:05 作者: WAG 時間: 2025-3-23 11:50
https://doi.org/10.1007/978-981-99-0272-9artificial intelligence; computer security; authentification; computer crime; machine learning; computer 作者: flamboyant 時間: 2025-3-23 15:23
Wanyi Gu,Guojun Wang,Peiqiang Li,Xubin Li,Guangxin Zhai,Xiangbin Li,Mingfei Chentrong-coupling problem. Namely it is the QED theory, where the correspondent problem of the “Landau pole” or the “Moscow zero” of the beta-function have led to the well known discussion about the common base of the quantum field theory.作者: 辭職 時間: 2025-3-23 19:10 作者: disrupt 時間: 2025-3-24 02:10 作者: 補助 時間: 2025-3-24 05:21 作者: 染色體 時間: 2025-3-24 07:22
Detecting Unknown Vulnerabilities in?Smart Contracts with?Multi-Label Classification Model Using CNNiLSTM model. Our model determines whether a vulnerability is unknown by detecting the opcode sequence representing the entire execution process of a transaction. Experimental results with the opcode sequences of transactions show that the model can achieve 82.86% accuracy and 83.63% F1-score.作者: Coma704 時間: 2025-3-24 11:54 作者: iodides 時間: 2025-3-24 17:07
Detecting Unknown Vulnerabilities in?Smart Contracts with?Binary Classification Model Using Machine inally, we validate the effectiveness of our scheme by three machine learning models, namely the K-Near Neighbor Algorithm (KNN), the Support Vector Machine (SVM), and the Logistic Regression (LR). The SVM model achieves an accuracy of 91.4% and F1-score of 75.3% for the detection of unknown vulnerabilities.作者: Impugn 時間: 2025-3-24 19:40
Hierarchical Policies of?Subgoals for?Safe Deep Reinforcement Learningper, we combine the subgoal embedding method with REINFORCE algorithm and PPO(Proximal Policy Optimization) algorithm to test the method in the MiniGrid-DoorKey game environment of the gym platform. The experiments demonstrate the effectiveness of the subgoal embedding method.作者: Epithelium 時間: 2025-3-25 00:59 作者: 攀登 時間: 2025-3-25 03:55 作者: 六個才偏離 時間: 2025-3-25 08:12 作者: committed 時間: 2025-3-25 11:48
1865-0929 ber 28–31, 2022..The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers..978-981-99-0271-2978-981-99-0272-作者: Bombast 時間: 2025-3-25 18:52 作者: 誘拐 時間: 2025-3-25 23:49
Zijing Zhang,Vimal Kumar,Michael Mayo,Albert Bifet Schwerpunkt auf der Hardware liegen soll, werden Softwarefragen nur insoweit behandelt, als sie zur Erl?uterung erforderlich sind. Es sei aber darauf hingewiesen, da? das Betriebssystem als Schnittstelle zum Programmierer ebenfalls einen sehr hohen Stellenwert hat.作者: 難取悅 時間: 2025-3-26 03:11 作者: 影響深遠 時間: 2025-3-26 07:25
Listen to?the?Music: Evaluating the?Use of?Music in?Audio Based Authenticationudio fingerprinting work has mostly used tonal frequencies which are not ideal in authentication as humans do not like sharp tonal frequencies as audio. This work investigates the usage of music as the audio for authentication instead of tonal frequencies. We also compare music with Dual Tone Multi 作者: collateral 時間: 2025-3-26 12:12
A Hybrid Secure Two-Party Protocol for Vertical Federated Learningcess. Multiple parties collaborate to train a machine learning model, while the data is kept locally, so as to achieve privacy-preservation of users. However, some studies have shown that an attacker can infer some sensitive information from the interacted data, even if the raw data is not available作者: Prophylaxis 時間: 2025-3-26 14:04
Detecting Unknown Vulnerabilities in?Smart Contracts with?Multi-Label Classification Model Using CNNetection methods mainly focus on known vulnerabilities with clear features and cannot deal with unknown vulnerabilities. As a consequence, proposing a method for detecting unknown vulnerabilities in smart contracts represents a significant advancement in the field of smart contract security. Aiming 作者: 運動吧 時間: 2025-3-26 19:41
CATS: A Serious Game in?Industry Towards Stronger Cloud Securitylue. It poses threats to cloud assets due to a greater attack surface than on-premises and other service models. Industry standards aim to regulate cloud security by enforcing best practices. To comply with the standards, practitioners in the industry are mandated to be trained to understand basic c作者: 蘑菇 時間: 2025-3-27 00:44 作者: Sinus-Node 時間: 2025-3-27 04:49 作者: Diaphragm 時間: 2025-3-27 05:16
Vulnerability Detection with Representation Learningtion. However, existing methods usually ignore the feature representation of vulnerable datasets, resulting in unsatisfactory model performance. Such vulnerability detection techniques should achieve high accuracy, relatively high true-positive rate, and low false-negative rate. At the same time, it作者: cogitate 時間: 2025-3-27 11:02 作者: Commodious 時間: 2025-3-27 15:24
Malware Traffic Classification Based on GAN and BP Neural Networkstworks for malware traffic classification, which is to identify malware traffic, normal traffic, and traffic types. The model is composed of generative adversarial network and back propagation neural networks. The generator of the generative adversarial network is responsible for inputting random no作者: Fraudulent 時間: 2025-3-27 21:05 作者: 蘆筍 時間: 2025-3-28 01:29
Detecting Unknown Vulnerabilities in?Smart Contracts with?Binary Classification Model Using Machine contracts are inevitably written with some vulnerabilities, which makes them vulnerable to attacks that cause property damage, and existing detection techniques and static analysis methods mainly target known vulnerability detection. We design a machine learning-based unknown vulnerability detectio作者: languid 時間: 2025-3-28 03:54 作者: Vasodilation 時間: 2025-3-28 09:15
An Aspect-Based Semi-supervised Generative Model for?Online Review Spam Detection is gradually changed by the network. More and more people consume food, clothing, housing and transportation through the Internet, and the online reviews left by people have become valuable information resources. However, the authenticity of online reviews is worrying. The proliferation of review s作者: coagulate 時間: 2025-3-28 13:28
Hierarchical Policies of?Subgoals for?Safe Deep Reinforcement Learnings well known that an agent based on deep reinforcement learning in complex environments is difficult to train. Moreover, the agent will generate unsafe and strange actions due to the lack of sufficient reward feedback from the environment. To make the agent converge to a better policy and make its b作者: 堅毅 時間: 2025-3-28 18:22
Improved DeepLabV3+?based Railway Track Extraction to Enhance Railway Transportation Safetyional railway track extraction method needs a lot of manpower and material resources, but the existing depth neural network method is inefficient. To solve the above problems, this paper proposes a railway extraction method that improves the DeepLabV3+?semantic segmentation model. The lightweight ne作者: 清晰 時間: 2025-3-28 19:10 作者: calumniate 時間: 2025-3-28 23:22 作者: CARK 時間: 2025-3-29 03:47
Conference proceedings 2023 2022..The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers..作者: 負擔 時間: 2025-3-29 10:28
Listen to?the?Music: Evaluating the?Use of?Music in?Audio Based AuthenticationFrequency (DTMF) audio. We present the results of our experimentation over source audio, feature extraction and performance under noise in this paper. The results of our experiments show that music in fact offers advantages such as better accuracy and better performance under noise in addition to sounding pleasant.作者: 收到 時間: 2025-3-29 12:10
oxides content and dark ore coloration where Ag chemically bound in Mn-oxides. Sr and Ba content along with sample color were indications that could be used as a proxy for recovery in geometallurgical mapping and ore-sorting.作者: 討好美人 時間: 2025-3-29 18:11 作者: Fermentation 時間: 2025-3-29 20:32 作者: 無聊的人 時間: 2025-3-29 23:58 作者: 同義聯(lián)想法 時間: 2025-3-30 06:24
Tiange Zhao,Ulrike Lechner,Maria Pinto-Albuquerque,Ece Ata,Tiago Gasibamicroprocessor technology, are introduced. Interfacing techniques are one of the focal points of these considerations. This puplication is organized as a textbook and is intended as a self-teaching course on 16-bit microprocessors for students of computer science and communications, design engineers and users978-3-540-15164-7978-3-642-93285-4作者: 不可知論 時間: 2025-3-30 10:49
Zhiqiang Wang,Sulong Meng,Ying Chenoder AIDS-related complex auf. Literatur Mosseler J, Schimpf K, Auerswald G, Bayer H, Schneider J, Hunsmann G (1985) Inability of pasteurised factor VIII preparations to induce antibodies to HTL V III after long-term treatment. Lancet i:ll1 Bayer H, Bienzle U, Schneider J, Hunsmann G (1984) HTL V III antibody978-3-540-17244-4978-3-642-71682-9作者: 內(nèi)疚 時間: 2025-3-30 13:44 作者: 人類 時間: 2025-3-30 17:07 作者: Hemoptysis 時間: 2025-3-30 21:37 作者: Tinea-Capitis 時間: 2025-3-31 01:12 作者: Halfhearted 時間: 2025-3-31 08:48 作者: 自制 時間: 2025-3-31 12:48
System Call Processing Using Lightweight NLP for?IoT Behavioral Malware Detection malware. We examine the effects of using lightweight NLP on malware like the DoS and the stealthy APT malware. For stealthier malware, such as the APT, using more advanced, but far more resource-intensive, NLP techniques will likely increase detection capability, which is saved for future work.作者: 上腭 時間: 2025-3-31 16:07 作者: eulogize 時間: 2025-3-31 20:27 作者: 信任 時間: 2025-4-1 01:21
Prototyping the?IDS Security Components in?the?Context of?Industry 4.0 - A Textile and?Clothing Indund Clothing Industry context. This prototype assures data sovereignty and enables the interactions required by all participants in this supply chain industry using secure communications. The adoption of IDS as a base model in this activity sector fosters productive collaboration, lowers entry barrie