花费 发表于 2025-3-25 07:06:03

http://reply.papertrans.cn/16/1598/159753/159753_21.png

谎言 发表于 2025-3-25 07:29:04

http://reply.papertrans.cn/16/1598/159753/159753_22.png

自传 发表于 2025-3-25 15:33:57

http://reply.papertrans.cn/16/1598/159753/159753_23.png

conference 发表于 2025-3-25 19:39:24

Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context r sessions context, such as IP ranges and Browser type. On the other hand, behavioral dynamics such as mouse and keyword features have been proposed in order to improve authentication, but have been shown most effective only in continuous authentication scenarios. In this paper we propose to combine

惊惶 发表于 2025-3-25 23:15:35

Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacksto . (MLaaSs). Meticulously crafted malicious inputs can be used to mislead and confuse the learning model, even in cases where the adversary only has limited access to input and output labels. As a result, there has been an increased interest in defence techniques to combat these types of attacks.

多产子 发表于 2025-3-26 00:56:20

http://reply.papertrans.cn/16/1598/159753/159753_26.png

继承人 发表于 2025-3-26 05:48:07

http://reply.papertrans.cn/16/1598/159753/159753_27.png

Impugn 发表于 2025-3-26 10:11:08

A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equationsent a new type of PoW, which relies on the hardness of solving a set of random quadratic equations over the finite field GF(2). We will present the advantages of such a PoW, in particular, in terms of its impact on decentralization and the incentives involved, and therefore demonstrate that this is

Concerto 发表于 2025-3-26 14:27:59

http://reply.papertrans.cn/16/1598/159753/159753_29.png

功多汁水 发表于 2025-3-26 20:15:35

Towards Blockchained Challenge-Based Collaborative Intrusion Detectionious organizations with the purpose of detecting any potential threats. While such systems and networks are usually vulnerable to insider attacks, some kinds of trust mechanisms should be integrated in a real-world application. Challenge-based trust mechanisms are one promising solution, which can m
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Applied Cryptography and Network Security Workshops; ACNS 2019 Satellite Jianying Zhou,Robert Deng,Kehuan Zhang Conference proceedings 201