晚来的提名 发表于 2025-3-28 15:04:42

http://reply.papertrans.cn/47/4656/465532/465532_41.png

Enliven 发表于 2025-3-28 21:45:58

Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzlesthat content, our mechanism prevents one content-holder from solving many others’ puzzles. We prove (in the random oracle model) the security of our scheme, describe our integration of bandwidth puzzles into a media streaming system, and demonstrate the resulting attack resilience via simulations.

FER 发表于 2025-3-29 01:30:25

A Robust Damage Assessment Model for Corrupted Database Systemsn transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency relationships. The essential properties of our model is also discussed.

Benzodiazepines 发表于 2025-3-29 07:05:20

http://reply.papertrans.cn/47/4656/465532/465532_44.png

阶层 发表于 2025-3-29 09:04:33

DROP: Detecting Return-Oriented Programming Malicious Codey space, such as standard GNU libc. Based on the features of the ROP malicious code, in this paper, we present a tool DROP, which is focused on dynamically detecting ROP malicious code. Preliminary experimental results show that DROP can efficiently detect ROP malicious code, and have no false positives and negatives.

Dna262 发表于 2025-3-29 14:46:36

A Framework for Behavior-Based Malware Analysis in the Cloudows security labs to improve the completeness of the analysis, by analyzing a piece of malware on behalf of multiple end-users simultaneously, while performing a fine-grained analysis of the behavior of the program with no computational cost for end-users.

corporate 发表于 2025-3-29 18:26:18

http://reply.papertrans.cn/47/4656/465532/465532_47.png

artless 发表于 2025-3-29 22:26:52

http://reply.papertrans.cn/47/4656/465532/465532_48.png

JAMB 发表于 2025-3-29 23:54:43

http://reply.papertrans.cn/47/4656/465532/465532_49.png

Evolve 发表于 2025-3-30 07:46:22

http://reply.papertrans.cn/47/4656/465532/465532_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Systems Security; 5th International Co Atul Prakash,Indranil Sen Gupta Conference proceedings 2009 Springer-Verlag Berlin Heide