Entropion 发表于 2025-3-30 09:23:38

: Predicting Cyber Risk of an Enterpriseternal, external and business attributes of around 200,000 firms of different sizes, line of business, locations and security profiles for a period of 12 months. Prediction models were built by deriving, for each company, a comprehensive set of metrics using novel filtering and, normalizing techniqu

保全 发表于 2025-3-30 15:01:29

http://reply.papertrans.cn/47/4656/465540/465540_52.png

Pert敏捷 发表于 2025-3-30 17:35:38

Towards Accuracy in Similarity Analysis of Android Applications of software birthmarks. We use Normalized Compression Distance to compute similar methods. The birthmarks are evaluated on a set of over 65,000 classes from 60 APKs. To evaluate the performance of our tool, we establish ground truth by manually reverse engineering each app. The proposed system is c

天气 发表于 2025-3-30 23:40:06

http://reply.papertrans.cn/47/4656/465540/465540_54.png

有角 发表于 2025-3-31 01:41:23

http://reply.papertrans.cn/47/4656/465540/465540_55.png

使坚硬 发表于 2025-3-31 06:58:26

Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Clf trust on the re-encrypting proxy for not carrying out unauthorized delegations. In this paper, we propose a proxy re-encryption scheme that takes into account the access control policy associated with data item(s) and despite the availability of re-encryption key(s), generates a valid re-encrypted

辞职 发表于 2025-3-31 10:26:52

From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCions Centers (SOCs) visits we have made in different organizations, we have designed a cyber collaborative activity model which has been used as a reference to design our 3D CyberCOP platform features, such as asymetrical collaboration, mutual awareness and roles specialization. Our approach can be

FACT 发表于 2025-3-31 16:51:41

ht well have ended with the controversial ‘clash of civilisations’ thesis by Samuel Huntington (1996). Yet, perhaps this flurry of interest does not constitute a genuine break with the past. As Kratochwil (1996: 203) notes, ‘ar from representing a mere personal preference […], questions of cultur
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Systems Security; 14th International C Vinod Ganapathy,Trent Jaeger,R.K. Shyamasundar Conference proceedings 2018 Springer Natu