Affection 发表于 2025-3-26 21:56:31

http://reply.papertrans.cn/47/4675/467477/467477_31.png

变色龙 发表于 2025-3-27 04:13:27

http://reply.papertrans.cn/47/4675/467477/467477_32.png

后退 发表于 2025-3-27 05:30:47

,ADAM: Automatic Detection of Android Malware,020 and CICMalDroid 2017 dataset. The experiment analysis showed that it achieves more than 98.5% accuracy. ADAM considers only static analysis, so becomes easy to deploy in smart phone to alert the user. ADAM is deployed over android mobile phone.

补充 发表于 2025-3-27 12:06:06

,A Forensic Framework for Webmail Threat Detection Using Log Analysis,. This leaves the opportunity for malicious insiders to covertly send confidential data through webmail and remain undetected. In this work a novel framework is proposed, which models the malicious insider scenario and create the activity logs using volatile memory forensics. To implement and test t

婴儿 发表于 2025-3-27 13:43:46

http://reply.papertrans.cn/47/4675/467477/467477_35.png

询问 发表于 2025-3-27 19:43:28

http://reply.papertrans.cn/47/4675/467477/467477_36.png

异端邪说2 发表于 2025-3-28 01:45:46

,Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to entation perspective, the unbalanced 5-way algorithm yields faster polynomial multiplication results. For application purposes, we pick the quantum-resistant key encapsulation protocol NTRU Prime, proposed by Bernstein ., since it executes a characteristic three polynomial multiplication in the deca

ALE 发表于 2025-3-28 04:50:43

http://reply.papertrans.cn/47/4675/467477/467477_38.png

臭了生气 发表于 2025-3-28 07:45:34

http://reply.papertrans.cn/47/4675/467477/467477_39.png

PRE 发表于 2025-3-28 12:09:59

http://reply.papertrans.cn/47/4675/467477/467477_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Innovative Security Solutions for Information Technology and Communications; 14th International C Peter Y.A. Ryan,Cristian Toma Conference