HARD 发表于 2025-3-28 17:13:22
http://reply.papertrans.cn/25/2418/241736/241736_41.pngEntrancing 发表于 2025-3-28 20:06:05
http://reply.papertrans.cn/25/2418/241736/241736_42.png季雨 发表于 2025-3-29 00:06:59
978-981-16-9228-4The Editor(s) (if applicable) and The Author(s) 2022MAUVE 发表于 2025-3-29 03:25:59
Cyber Security978-981-16-9229-1Series ISSN 1865-0929 Series E-ISSN 1865-0937bypass 发表于 2025-3-29 09:00:36
http://reply.papertrans.cn/25/2418/241736/241736_45.pngcardiopulmonary 发表于 2025-3-29 12:04:39
On Testing the RE Hypothesis: A Surveytages such as decentralization and non-tamperability perfectly meet the needs of permanent query of traceability scene information, and can solve the trust problem of multi-party participation in various links. At the same time, as data security has received more and more attention. The privacy prot背心 发表于 2025-3-29 16:10:38
Vamsi Krishna Moparthi,Cecilia Hägerhällransaction behaviors in Tornado Cash mixing mechanism lead to the risk of privacy leakage. More specifically, the malicious attackers can link multiple addresses of the same users according to the transaction data. Motivated by the above problem, this paper systematically analyzes the privacy issuesJejune 发表于 2025-3-29 21:13:32
Anne Volbeda,Juan C. Fontecilla-Campsrs. By collecting information such as screen resolution, user agent, and WebGL rendered data, the tracker can generate a unique identifier for users without their knowledge, leading to a severe violation of user privacy. Therefore, an effective detection and defense technology for browser fingerprinProsaic 发表于 2025-3-29 23:53:01
Rouslan G. Efremov,Leonid Sazanovprocess according to a given sampling rate. It also has the ability to describe space and time and is widely used in many fields such as system state anomaly detection. However, multi-dimensional time series have problems such as dimensional explosion and data sparseness, as well as complex pattern悲痛 发表于 2025-3-30 04:28:35
Complexes I in the Green Lineagenitored the Tor network by developing a fast and distributed exit relay scanner (ExitSniffer) to probe all exit relays over a period of 16 months continuously, seeking to expose the anomalous binding relationship phenomena of exit routers simply by comparing the returnIP and consensusIP. We totally