Ruptured-Disk 发表于 2025-3-28 15:36:42

http://reply.papertrans.cn/27/2633/263230/263230_41.png

修剪过的树篱 发表于 2025-3-28 20:19:33

http://reply.papertrans.cn/27/2633/263230/263230_42.png

值得 发表于 2025-3-29 02:09:58

http://reply.papertrans.cn/27/2633/263230/263230_43.png

certitude 发表于 2025-3-29 07:06:37

http://reply.papertrans.cn/27/2633/263230/263230_44.png

巫婆 发表于 2025-3-29 07:39:54

http://reply.papertrans.cn/27/2633/263230/263230_45.png

forbid 发表于 2025-3-29 11:33:22

Computer Security -- ESORICS 2015s identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant departures from normal user behavior. If a user’s normal profile deviates from their original behavior, it could potentially signal an ongoing masquerade attack. In this paper we proposed a new fra

移动 发表于 2025-3-29 19:11:19

Data and Applications Security and Privacy XXVI978-3-642-31540-4Series ISSN 0302-9743 Series E-ISSN 1611-3349

调味品 发表于 2025-3-29 21:50:29

http://reply.papertrans.cn/27/2633/263230/263230_48.png

inflame 发表于 2025-3-30 03:17:23

http://reply.papertrans.cn/27/2633/263230/263230_49.png

acrimony 发表于 2025-3-30 04:49:58

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/263230.jpg
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Data and Applications Security and Privacy XXVI; 26th Annual IFIP WG Nora Cuppens-Boulahia,Frédéric Cuppens,Joaquin Gar Conference proceed