cataract 发表于 2025-3-28 18:13:26

http://reply.papertrans.cn/47/4602/460174/460174_41.png

nocturia 发表于 2025-3-28 21:17:43

http://reply.papertrans.cn/47/4602/460174/460174_42.png

indigenous 发表于 2025-3-29 02:37:57

http://reply.papertrans.cn/47/4602/460174/460174_43.png

反省 发表于 2025-3-29 06:19:53

D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage hardware security modules to provide for controlled live cloud forensics and tamper-evident access logs. A Google Drive-based proof of concept, using the SEcube hardware security module, demonstrates that . is feasible whenever the performance penalty incurred is affordable.

tenosynovitis 发表于 2025-3-29 08:20:55

Robust PDF Files Forensics Using Coding Styleating Systems. We have obtained a set of 192 rules which can be used to identify 11 PDF producers. We have tested our detection tool on 508836 PDF files published on scientific preprint servers. Our tool can detect certain producers with an accuracy of 100%. Its overall detection is still high (74%).

FLIT 发表于 2025-3-29 15:13:29

http://reply.papertrans.cn/47/4602/460174/460174_46.png
页: 1 2 3 4 [5]
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 37th IFIP TC 11 Inte Weizhi Meng,Simone Fischer-Hübner,Christian D. Jen Conference proceedings