grovel 发表于 2025-3-23 11:45:50

CO-FISH, COD-FISH, ReD-FISH, SKY-FISH,ed, the self-aware agent communicates with the security mechanisms so that they can take the necessary actions. The design of the security mechanisms are elaborated using access control system and anti-virus as example cases.

MAIM 发表于 2025-3-23 14:18:23

http://reply.papertrans.cn/24/2337/233642/233642_12.png

ABIDE 发表于 2025-3-23 19:32:10

Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifierst of classifiers due to the descending cascade learning of the binary classifier ensemble. The results of experiments using the open data set for calculating the performance indicators of detection and classification of network anomalies are provided.

aquatic 发表于 2025-3-23 23:00:43

http://reply.papertrans.cn/24/2337/233642/233642_14.png

愤怒事实 发表于 2025-3-24 03:13:49

Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure are supported by a set of the interactive interconnected visual models aimed to present spatial and temporal route patterns. We demonstrate our approach with an application to the VAST MiniChallenge-2 2016 data set, which describes movement of the employees within organization building.

buoyant 发表于 2025-3-24 06:45:07

Choosing Models for Security Metrics Visualizations. In addition, the most suitable models for different metric groups are outlined and analyzed. A case study is presented as an illustration on the way the visualization models are integrated with different metrics for security awareness.

inflate 发表于 2025-3-24 12:26:30

http://reply.papertrans.cn/24/2337/233642/233642_17.png

AFFIX 发表于 2025-3-24 17:17:06

Conference proceedings 2017ion and Visualization; Security and Resilience of Network Systems; Adaptive Security; Anti-malware Techniques: Detection, Analysis, Prevention; Security of Emerging Technologies; Applied Cryptography; New Ideas and Paradigms for Security..

aggrieve 发表于 2025-3-24 19:25:46

0302-9743Models, and Architectures for Computer Network Security, MMM-ACNS 2017, held in Warsaw, Poland, in August 2017. .The 12 revised full papers, 13 revised short presentations, and 3 invited papers were carefully reviewed and selected from a total of 40 submissions. The papers are organized in topical

Peculate 发表于 2025-3-25 02:09:03

Telekommunikatives Handeln im Alltag collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated by referring to a case study of development of a medical domain related application that is supposed to meet the requirements imposed by the IEC 62443-4.1 standard.
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Computer Network Security; 7th International Co Jacek Rak,John Bay,Krzysztof Szczypiorski Conference proceedings 2017 Springer Internationa