南极 发表于 2025-3-26 21:04:48

http://reply.papertrans.cn/47/4602/460168/460168_31.png

最有利 发表于 2025-3-27 02:09:48

http://reply.papertrans.cn/47/4602/460168/460168_32.png

synchronous 发表于 2025-3-27 08:15:12

Control Logic Injection Attacks on Industrial Control Systemsa PLC and then, changes the PLC’s system control flow to execute the attacker’s logic. . attack subverts deep packet inspection (DPI) by appending a sequence of padding bytes in control logic packets while keeping the size of the attacker’s logic in packet payloads significantly small. We implement

颠簸地移动 发表于 2025-3-27 10:24:20

http://reply.papertrans.cn/47/4602/460168/460168_34.png

blackout 发表于 2025-3-27 15:40:36

http://reply.papertrans.cn/47/4602/460168/460168_35.png

HALO 发表于 2025-3-27 21:17:31

Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wildad adoption of RBA..In this paper, with a series of studies on eight popular online services, we (i) analyze which features and combinations/classifiers are used and are useful in practical instances, (ii) develop a framework and a methodology to measure RBA in the wild, and (iii) survey and discuss

Commentary 发表于 2025-3-27 22:46:39

http://reply.papertrans.cn/47/4602/460168/460168_37.png

催眠药 发表于 2025-3-28 03:05:36

SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking App user study with 50 participants and demonstrate that touch behavioral deviation under our scheme could be significantly decreased and kept relatively stable even after a long-term period, i.e., a single SVM classifier could achieve an average error rate of about 3.1% and 3.7% before and after two w

我吃花盘旋 发表于 2025-3-28 10:18:06

http://reply.papertrans.cn/47/4602/460168/460168_39.png

vitreous-humor 发表于 2025-3-28 13:44:21

To Be, or Not to Be Notifiednotification preferences correlate with privacy personas established in the context of trust in and reliability of online data services. Based on our findings, we discuss the implications for the design of usable ex post TETs.
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 34th IFIP TC 11 Inte Gurpreet Dhillon,Fredrik Karlsson,André Zúquete Conference proceedings 20