BUDGE 发表于 2025-3-28 14:46:24

Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Fa malicious attacks, and can distort values of variables, operations, the codes, etc., is solved by applying the widely used Fault Injection (FI) simulation technique. Main drawback of the FI is necessity to have different expensive software that can not be used to solve other design problems, in par

MURAL 发表于 2025-3-28 20:56:13

http://reply.papertrans.cn/25/2418/241746/241746_42.png

forebear 发表于 2025-3-28 22:55:19

A Supervised Auto-Tuning Approach for a Banking Fraud Detection System,anksealer was unable to exploit analyst feedback to self-tune and improve its performance. It also depended on a complex set of parameters that had to be tuned by hand before operations..To overcome both these limitations, we propose a supervised evolutionary wrapper approach, that considers analyst

不如乐死去 发表于 2025-3-29 06:52:59

Scalable Attack Path Finding for Increased Security,ompromising other hosts until they create a path to the critical assets. Consequently, network administrators must examine the protected network as a whole rather than each vulnerable host independently. To this end, various methods were suggested in order to analyze the multitude of attack paths in

渐变 发表于 2025-3-29 07:33:03

http://reply.papertrans.cn/25/2418/241746/241746_45.png

行业 发表于 2025-3-29 13:58:47

Building Regular Registers with Rational Malicious Servers and Anonymous Clients,he malicious server (behave correctly and not be detected by clients vs returning a wrong register value to clients with the risk of being detected and then excluded by the computation). We prove such equilibrium exists and finally we design a protocol implementing the regular register that forces the rational malicious server to behave correctly.

Glutinous 发表于 2025-3-29 19:32:45

Brief Announcement: A Consent Management Solution for Enterprises,IT solutions that can address these privacy issues are still lacking. We briefly outline our solution and its main component called “Consent Manager”, for the management, automatic enforcement and auditing of user consent. We then describe how the Consent Manager was adopted as part of the European FP7 project COSMOS.

创造性 发表于 2025-3-29 21:35:55

0302-9743 and Machine Learning, held in Beer-Sheva, Israel, in June 2017..The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure sy

interrupt 发表于 2025-3-29 23:57:31

http://reply.papertrans.cn/25/2418/241746/241746_49.png

发表于 2025-3-30 07:36:02

http://reply.papertrans.cn/25/2418/241746/241746_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Cyber Security Cryptography and Machine Learning; First International Shlomi Dolev,Sachin Lodha Conference proceedings 2017 Springer Inter