Obvious 发表于 2025-3-27 00:52:22

http://reply.papertrans.cn/47/4602/460175/460175_31.png

Bumptious 发表于 2025-3-27 03:18:57

Using Process Invariants to Detect Cyber Attacks on a Water Treatment Systemtem (ICS). An invariant was derived from one selected sub-process and coded into the corresponding controller. Experiments were performed each with an attack selected from a set of three stealthy attack types and launched in different states of the system to cause tank overflow and degrade system pr

名字 发表于 2025-3-27 05:42:51

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloudice providers (CSP). In terms of virtual resource allocation driven by security requirements, most of proposals take the aspect of cloud service customer (CSC) into account but do not address such requirements from CSP. Besides, it is a shared understanding that using a formal policy model to suppor

instructive 发表于 2025-3-27 10:09:17

http://reply.papertrans.cn/47/4602/460175/460175_34.png

同时发生 发表于 2025-3-27 16:00:51

Teaching Phishing-Security: Which Way is Best?vere ramifications. It has been shown that technical measures alone are insufficient to counter all threats. For instance, it takes technical measures on average 32 h before identifying and blocking phishing websites. Therefore, teaching users how to identify malicious websites is of utmost importan

转向 发表于 2025-3-27 20:22:13

On Gender Specific Perception of Data Sharing in Japanit is difficult– especially for foreign researchers – to understand the situation in Japan. To get a deeper understanding we examined the perception of a topic that is closely related to privacy: the perceived benefits of sharing data and the willingness to share in respect to the benefits for onese

indices 发表于 2025-3-27 22:48:39

http://reply.papertrans.cn/47/4602/460175/460175_37.png

Optimum 发表于 2025-3-28 03:37:34

http://reply.papertrans.cn/47/4602/460175/460175_38.png

擦试不掉 发表于 2025-3-28 09:16:15

Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependencealled by a user’s friends can collect and potentially misuse her personal data inflicting . on the user while leaving her without proper means of control. In this paper, we present a multi-faceted study on the . of apps in social networks. We conduct a user survey and show that Facebook users are co

尾巴 发表于 2025-3-28 12:52:30

978-3-319-81560-2IFIP International Federation for Information Processing 2016
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 31st IFIP TC 11 Inte Jaap-Henk Hoepman,Stefan Katzenbeisser Conference proceedings 2016 IFIP I