ARM 发表于 2025-3-27 00:57:16

AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve ., and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.

MITE 发表于 2025-3-27 02:26:10

http://reply.papertrans.cn/83/8280/827940/827940_32.png

同义联想法 发表于 2025-3-27 07:15:58

Proactive Discovery of Phishing Related Domain Nameshing related activities - “secure”, “banking”, brand names, etc. Once a pro-active blacklist is created, ongoing and daily monitoring of only these domains can lead to the efficient detection of phishing web sites.

极小 发表于 2025-3-27 13:28:17

DEMACRO: Defense against Malicious Cross-Domain Requestsects potentially malicious cross-domain requests and de-authenticates them by removing existing session credentials. Our system requires no training or user interaction and imposes minimal performance overhead on the user’s browser.

restrain 发表于 2025-3-27 17:19:22

FlashDetect: ActionScript 3 Malware Detectiont 3. . classifies submitted files using a naive Bayesian classifier based on a set of predefined features. Our experiments show that . has high classification accuracy, and that its efficacy is comparable with that of commercial anti-virus products.

peritonitis 发表于 2025-3-27 20:15:07

N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols n-gram analysis on real-life environments. Our tests show that the analyzed systems, in presence of data with high variability, cannot deliver high detection and low false positive rates at the same time.

Optic-Disk 发表于 2025-3-28 01:21:33

http://reply.papertrans.cn/83/8280/827940/827940_37.png

愉快吗 发表于 2025-3-28 02:32:45

http://reply.papertrans.cn/83/8280/827940/827940_38.png

妈妈不开心 发表于 2025-3-28 07:21:32

Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)bedding support for their local languages and using a larger set of phrases. Similarly, uploading a photo of valuable items on social networks can also incentivize crime. Moreover, sleeping and drinking patterns identified from uploads, can help criminals in planning their crime execution hours.

Bronchial-Tubes 发表于 2025-3-28 11:02:51

http://reply.papertrans.cn/83/8280/827940/827940_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Research in Attacks, Intrusions and Defenses; 15th International S Davide Balzarotti,Salvatore J. Stolfo,Marco Cova Conference proceedings