紧张过度 发表于 2025-3-28 14:40:27

http://reply.papertrans.cn/87/8626/862588/862588_41.png

overture 发表于 2025-3-28 19:37:13

The Shared Memory Based Cryptographic Card Virtualizationtiple virtual cryptographic cards, and encapsulates it as a virtual cipher machine (VCM) for users. This solution enables multiple VCMs to share hardware cryptographic resources effectively and reduce the hardware requirements for cloud servers to use cryptographic resources dramatically, realizing

amyloid 发表于 2025-3-29 00:13:50

Feature Transfer Based Network Anomaly Detection obtain a pair of normal data samples with completely different features, this paper uses only one kind of normal data sample with good consistency. This paper uses the Transformer model to build the experimental framework and conduct 50 iterations of the experiment. The Corrected validation set fro

不能逃避 发表于 2025-3-29 04:01:38

http://reply.papertrans.cn/87/8626/862588/862588_44.png

Dorsal 发表于 2025-3-29 08:48:43

AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Smad. Compared with three state-of-the-art anti-tracking network topologies, AtNet obviously has better robustness. Moreover, we implement the prototype system and evaluate the maintenance effect and defense effect. The experiment results show that AtNet can keep good robustness, anti-tracking capabili

现存 发表于 2025-3-29 14:57:44

A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detectionage mainly analyzes five kinds of DNS tunnel behaviors and classifies them with machine learning methods. Finally, more than 50 millions normal DNS sessions traffic is collected from the real network environment, and tunnel traffic is produced by DNS covert tunnel tools. Through experiments, using t

敲竹杠 发表于 2025-3-29 19:20:57

http://reply.papertrans.cn/87/8626/862588/862588_47.png

syring 发表于 2025-3-29 21:28:22

http://reply.papertrans.cn/87/8626/862588/862588_48.png

正式通知 发表于 2025-3-30 03:05:23

cs that were frequently discussed in the community. We clustered the topics into the following six meta-topics: User Accounts and Authentication, Connectivity, Cloud Database, Specific Technologies, SAP Resources, and Installation. Platform owners can use our approach to (1) identify frequently disc

方便 发表于 2025-3-30 07:03:39

Chuyi Yan,Haixia Xu,Yongheng Mu,Jiong Dingcs that were frequently discussed in the community. We clustered the topics into the following six meta-topics: User Accounts and Authentication, Connectivity, Cloud Database, Specific Technologies, SAP Resources, and Installation. Platform owners can use our approach to (1) identify frequently disc
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Science of Cyber Security; 4th International Co Chunhua Su,Kouichi Sakurai,Feng Liu Conference proceedings 2022 The Editor(s) (if applicabl