Apraxia 发表于 2025-3-23 10:50:09
http://reply.papertrans.cn/47/4653/465282/465282_11.pngParameter 发表于 2025-3-23 14:56:37
http://reply.papertrans.cn/47/4653/465282/465282_12.png恭维 发表于 2025-3-23 21:37:07
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs slow-mixing graphs tend to have smaller multiple cores. We then propose several heuristics to improve the mixing of slow-mixing graphs using their topological structures by augmenting them. We show that our heuristics greatly improve Sybil defenses.Trochlea 发表于 2025-3-23 23:49:44
Bifocals: Analyzing WebView Vulnerabilities in Android ApplicationsebView-related vulnerabilities (. of applications containing WebViews). Based on our findings, we suggest a modification to WebView security policies that would protect over . of the vulnerable applications with little burden on developers.绊住 发表于 2025-3-24 06:09:01
Yongdae Kim,Heejo Lee,Adrian PerrigIncludes supplementary material:决定性 发表于 2025-3-24 07:18:03
http://reply.papertrans.cn/47/4653/465282/465282_16.png没收 发表于 2025-3-24 12:53:10
http://reply.papertrans.cn/47/4653/465282/465282_17.png不真 发表于 2025-3-24 15:30:36
Information Security Applications978-3-319-05149-9Series ISSN 0302-9743 Series E-ISSN 1611-3349一致性 发表于 2025-3-24 22:54:26
http://reply.papertrans.cn/47/4653/465282/465282_19.png金盘是高原 发表于 2025-3-25 02:24:28
Conference proceedings 2014Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.