floaters 发表于 2025-3-28 15:08:32

http://reply.papertrans.cn/32/3192/319133/319133_41.png

CHAR 发表于 2025-3-28 20:28:23

http://reply.papertrans.cn/32/3192/319133/319133_42.png

CIS 发表于 2025-3-28 23:15:51

http://reply.papertrans.cn/32/3192/319133/319133_43.png

braggadocio 发表于 2025-3-29 06:42:45

http://reply.papertrans.cn/32/3192/319133/319133_44.png

APO 发表于 2025-3-29 09:15:11

https://doi.org/10.1007/978-4-431-53959-9aditional SHA-256 algorithm, this results in a better and more efficient 256-bit hashing programming algorithm for 64-bit architectures. Furthermore, we address the security concerns associated with the Narrowband Internet of Things (NB-IoT) in food supply chain management by juxtaposing blockchain

BULLY 发表于 2025-3-29 12:48:50

A Detailed Survey on Network Intrusion Detection in Cloud Using Different Techniques,cious activity. IDSs can use machine learning algorithms like ANNs or SVMs analyze data and identify potential threats. These systems have the ability to improve network security by alerting administrators to potential threats in real time. However, IDSs also have limitations, such as being affected

使闭塞 发表于 2025-3-29 16:40:52

Adoption of Network Function Virtualization Technology in Education,ities like a firewall or encryption from a dedicated source or hardware and moving to virtual servers. The network function virtualization has seen keen attention and grasping from both industries and academic institutions as a transformation in telecommunications. This technology allows compactible

新星 发表于 2025-3-29 23:45:18

An Efficient Secure Cloud Image Deduplication with Weighted Min-Hash Algorithm,ation. Clients would want to utilize end-to-end data encryption to protect data security; however, effective encryption nullifies the value of all established storage-optimization methods like data deduplication. To save cost and storage space, image deduplication in cloud computing is proposed. To

轻浮思想 发表于 2025-3-30 00:59:13

An Intelligence Security Architecture for Mitigating DDOS Attack in CloudIoT Environment,e accessed from anywhere. Even though . and . have been developed independently, combining these two technologies results in a renaissance in the construction of smart environments and future networks. . is the name of the latest evolution. The major concern with . is security. Researchers from arou

Noctambulant 发表于 2025-3-30 06:48:19

Automated Activity Scheduling Using Heuristic Approach,ture time, and many other factors. This paper suggests a heuristic timetable optimization method to increase lesson planning productivity. This work aims to find an optimal solution to the timetabling problem, which is one of the highly constrained N-P hard problems. The need for this sort of timeta
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Expert Clouds and Applications; Proceedings of ICOEC I. Jeena Jacob,Selvanayaki Kolandapalayam Shanmuga Conference proceedings 2023 The Edi