Feedback 发表于 2025-3-28 16:31:00

http://reply.papertrans.cn/47/4653/465292/465292_41.png

Thyroxine 发表于 2025-3-28 21:26:58

Conference proceedings 2021lace on Jeju Island, South Korea, during August 2021. The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security..

rheumatism 发表于 2025-3-29 00:34:22

A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Sya genetic algorithm to generate optimal attack features for certain attack categories, which are evaluated against a decision tree-based IDS in terms of their fitness measurements. To demonstrate the feasibility of our approach, we perform experiments based on the NSL-KDD dataset and analyze the algorithm performance.

软弱 发表于 2025-3-29 04:05:19

Anonymous IBE from PEKS: A Generic Constructionessage, we firstly define a multiple PEKS (mPEKS) scheme and show that a mPEKS scheme can be constructed from a PEKS scheme. We also prove that if a PEKS scheme is confidential, so is the resulting mPEKS scheme. We then provide a transform from a mPEKS scheme to an A-IBE scheme for a polynomially many-bit message.

mucous-membrane 发表于 2025-3-29 07:49:12

http://reply.papertrans.cn/47/4653/465292/465292_45.png

清楚说话 发表于 2025-3-29 13:44:53

http://reply.papertrans.cn/47/4653/465292/465292_46.png

giggle 发表于 2025-3-29 18:30:36

http://reply.papertrans.cn/47/4653/465292/465292_47.png

中子 发表于 2025-3-29 21:37:48

http://reply.papertrans.cn/47/4653/465292/465292_48.png

泄露 发表于 2025-3-30 02:08:41

http://reply.papertrans.cn/47/4653/465292/465292_49.png

INERT 发表于 2025-3-30 06:50:07

Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments. However, it also increases the attack surface and exposes industrial systems to various types of IIoT threats. Smart manufacturing environments, built based on IIoT, are also automated and unattended and must respond to physical threats (e.g., vandalism, destruction, theft, etc.) and cybersecurity
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security Applications; 22nd International C Hyoungshick Kim Conference proceedings 2021 Springer Nature Switzerland AG 2021 AI