Germinate 发表于 2025-3-25 05:25:55

http://reply.papertrans.cn/87/8633/863300/863300_21.png

flourish 发表于 2025-3-25 08:20:53

http://reply.papertrans.cn/87/8633/863300/863300_22.png

空洞 发表于 2025-3-25 15:09:39

Thorsten Jenke,Elmar Padilla,Lilli Bruckschenctive use of knowledge are the crucial missing techniques whose inclusion over the coming years will transform today‘s industrial robot into a truly robotic system embodying the ‘intelligent connection of perception to action‘. The use of computers to implement these techniques is the domain of Artificial Int978-1-4684-6239-5978-1-4684-6237-1

神圣不可 发表于 2025-3-25 15:57:27

Mario Lins,René Mayrhofer,Michael Roland,Alastair R. Beresford

方便 发表于 2025-3-25 23:40:00

http://reply.papertrans.cn/87/8633/863300/863300_25.png

Mendicant 发表于 2025-3-26 01:14:18

http://reply.papertrans.cn/87/8633/863300/863300_26.png

Observe 发表于 2025-3-26 06:48:10

From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channelslyze websites of 15 Finnish companies and the whistleblowing services they employ in order to assess whether they inadvertently reveal identifying personal data to the employee’s company and third parties. Results indicate there is reason for serious concern about the privacy of whistleblowers who report wrongdoings online.

墙壁 发表于 2025-3-26 10:07:14

Analysis of a Consent Management Specification and Prototype Under the GDPRoposed specification to the state of the art based on a prototype implementation and evaluation. Based on a small usability study, we found our solution to reduce the necessary interactions with respect to consenting, consent withdrawal, and consent configuration by far.

检查 发表于 2025-3-26 14:57:23

http://reply.papertrans.cn/87/8633/863300/863300_29.png

Terrace 发表于 2025-3-26 19:45:59

Mean Value Analysis of Critical Attack Paths with Multiple Parametersonstrate that the results are similar to the ones from Monte-Carlo simulations. Consequently, the utility function-based approach can substitute time-consuming simulations and can be a valuable component of dynamic defense strategies.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Secure IT Systems; 28th Nordic Conferen Lothar Fritsch,Ismail Hassan,Ebenezer Paintsil Conference proceedings 2024 The Editor(s) (if applic