Apraxia
发表于 2025-3-23 10:50:09
http://reply.papertrans.cn/47/4653/465282/465282_11.png
Parameter
发表于 2025-3-23 14:56:37
http://reply.papertrans.cn/47/4653/465282/465282_12.png
恭维
发表于 2025-3-23 21:37:07
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs slow-mixing graphs tend to have smaller multiple cores. We then propose several heuristics to improve the mixing of slow-mixing graphs using their topological structures by augmenting them. We show that our heuristics greatly improve Sybil defenses.
Trochlea
发表于 2025-3-23 23:49:44
Bifocals: Analyzing WebView Vulnerabilities in Android ApplicationsebView-related vulnerabilities (. of applications containing WebViews). Based on our findings, we suggest a modification to WebView security policies that would protect over . of the vulnerable applications with little burden on developers.
绊住
发表于 2025-3-24 06:09:01
Yongdae Kim,Heejo Lee,Adrian PerrigIncludes supplementary material:
决定性
发表于 2025-3-24 07:18:03
http://reply.papertrans.cn/47/4653/465282/465282_16.png
没收
发表于 2025-3-24 12:53:10
http://reply.papertrans.cn/47/4653/465282/465282_17.png
不真
发表于 2025-3-24 15:30:36
Information Security Applications978-3-319-05149-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
一致性
发表于 2025-3-24 22:54:26
http://reply.papertrans.cn/47/4653/465282/465282_19.png
金盘是高原
发表于 2025-3-25 02:24:28
Conference proceedings 2014Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.