Mettle 发表于 2025-3-27 00:22:47

Association Visualization Analysis for the Application Service Layer and Network Control Layerted but connective. In this paper, different from the traditional Open System Interconnection (OSI) model, our research pays attention to application service layer and network control layer for the view of application. Two layers connect with each other by using IP mapping relationship. Firstly, to

制定法律 发表于 2025-3-27 03:32:56

Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation. Security protection framework based on cloud-channel-device cooperation is proposed in this paper to solve the issue. The trust base is introduced to channel-end to improve trust of secure accessing device. Then, the trust and security module are designed in the cloud-end. Meanwhile, access contro

left-ventricle 发表于 2025-3-27 08:50:19

Conference proceedings‘‘‘‘‘‘‘‘ 2019g, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence sec

中止 发表于 2025-3-27 09:52:22

1865-0929in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intell

decipher 发表于 2025-3-27 14:03:06

Spain and the Non-Proliferation Treatyk implements service transportation with control method of the distributed-centralized combination. The mechanism optimize relevant network elements devices and reasonably allocates limited resources to improve end-to-end target depending on given strategies.

eczema 发表于 2025-3-27 19:50:23

Administration of Workstations,nd authentication are proposed. The proposed method can improve security and provide identity authentication for cloud, IoT, etc. The theoretical performance analysis proves that it is feasible and effective.

gerrymander 发表于 2025-3-28 01:09:36

Gerhard Fels,George M. von Furstenbergurity risks. This paper analyzes mobile devices security issues, and gives the drawback for 27001 in mobile security. Finally, this paper gives a consideration to these issues under ISO/IEC 27001 information security management system framework.

河潭 发表于 2025-3-28 03:22:25

http://reply.papertrans.cn/25/2418/241740/241740_38.png

Arroyo 发表于 2025-3-28 07:24:03

Research on Identity Authentication Method Based on Negative Logic Systemnd authentication are proposed. The proposed method can improve security and provide identity authentication for cloud, IoT, etc. The theoretical performance analysis proves that it is feasible and effective.

诽谤 发表于 2025-3-28 13:04:15

Extension of ISO/IEC27001 to Mobile Devices Security Managementurity risks. This paper analyzes mobile devices security issues, and gives the drawback for 27001 in mobile security. Finally, this paper gives a consideration to these issues under ISO/IEC 27001 information security management system framework.
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Cyber Security; 15th International A Xiaochun Yun,Weiping Wen,Yu Zhou Conference proceedings‘‘‘‘‘‘‘‘ 2019 The Editor(s) (if applicable) and