马赛克 发表于 2025-3-26 21:00:14

: A Contextual Privacy Framework for Social Softwaresocial software, context can be ambiguous due to the overload of data and the mix of various audiences. Such ambiguity may result in privacy issues..To overcome context and privacy issues, we propose ., a conceptual framework for contextual privacy management. The frameworks is based on an analysis

甜得发腻 发表于 2025-3-27 05:04:02

http://reply.papertrans.cn/48/4715/471422/471422_32.png

parsimony 发表于 2025-3-27 05:56:38

http://reply.papertrans.cn/48/4715/471422/471422_33.png

没花的是打扰 发表于 2025-3-27 11:56:01

http://reply.papertrans.cn/48/4715/471422/471422_34.png

SOBER 发表于 2025-3-27 17:11:42

Online Detection of Concurrent Prefix Hijacksve method to defend routing security. However, the existing concurrent prefix hijack detection scheme considers no prefix ownership changes, and online concurrent prefix hijack detection endures seriously false positive. In this paper, we study the possible characters to filter out false positive ev

overweight 发表于 2025-3-27 19:17:08

http://reply.papertrans.cn/48/4715/471422/471422_36.png

Chronic 发表于 2025-3-28 01:45:30

A New Anomaly Detection Method Based on IGTE and IGFE (Inter-group Flow Entropy), are proposed for network anomaly detection. It is observed that IGTE and IGFE are highly correlated and usually change synchronously when no anomaly occurs. However, once anomalies occur, this highly linear correlation would be destroyed. Based on this observation, we pr

heart-murmur 发表于 2025-3-28 05:49:09

Forensic Potentials of Solid State Drivesthat (1) SSDs destroy the forensics evidences automatically and (2) even after sanitization of SSDs, data can be recovered. This paper investigates this issue and reports experimental findings that identify the reason why certain SSDs seem to destroy forensic evidences while other SSDs do not. The e

职业拳击手 发表于 2025-3-28 06:30:09

http://reply.papertrans.cn/48/4715/471422/471422_39.png

得罪 发表于 2025-3-28 10:32:15

A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCE for its complexity, diversity, and timeliness of data for any large eHealth System such as Personally Controlled Electronic Health Record (PCEHR). The system enables different person or organization to access, share, and manage their health data. Other challenges incorporated with the PCEHR data ca
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: International Conference on Security and Privacy in Communication Networks; 10th International I Jin Tian,Jiwu Jing,Mudhakar Srivatsa Confe