丑恶 发表于 2025-3-28 18:35:11

http://reply.papertrans.cn/16/1593/159236/159236_41.png

刀锋 发表于 2025-3-28 21:56:25

http://reply.papertrans.cn/16/1593/159236/159236_42.png

archenemy 发表于 2025-3-29 00:13:38

http://reply.papertrans.cn/16/1593/159236/159236_43.png

crucial 发表于 2025-3-29 06:24:41

http://reply.papertrans.cn/16/1593/159236/159236_44.png

limber 发表于 2025-3-29 07:17:58

http://reply.papertrans.cn/16/1593/159236/159236_45.png

机警 发表于 2025-3-29 12:34:43

http://reply.papertrans.cn/16/1593/159236/159236_46.png

Senescent 发表于 2025-3-29 18:48:13

The Research of Extraction Algorithm for Target Feature of Chest Bitmape feature information of the target surface is extracted. The result of simulation shows that the target surface information extraction algorithm for chest bitmap is characterized by low-complexity, short time-consuming and high efficiency, and meets the real-time requirement.

nauseate 发表于 2025-3-29 23:47:28

A Method for Detecting Trojan Based on Hidden Network Traffic Analysisrating system and the hardware are reduced to a black box with two end points. Hidden traffic can be easily extracted regardless of the Trojan hidden technologies. After this, a special-Trojan detection system based on the extraction of the hidden traffic is present. The experimental result has demonstrated the usage of the traffic extract model.

Herd-Immunity 发表于 2025-3-30 02:23:59

http://reply.papertrans.cn/16/1593/159236/159236_49.png

增长 发表于 2025-3-30 04:58:57

http://reply.papertrans.cn/16/1593/159236/159236_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Applications and Techniques in Information Security; International Confer Lynn Batten,Gang Li,Matthew Warren Conference proceedings 2014 Sp