诱导 发表于 2025-3-28 17:26:45

For Aviation Security Using Surveillance System,danger of cyber-attacks on the system is increasing. Because of low-cost computer technology and easier access to malware, or malicious software code, it is conceivable for individuals, organized crime groups, terrorists, and nation-states to attack the Rep. of Korea air transportation system infras

失望昨天 发表于 2025-3-28 19:31:05

An Efficient Intrusion Detection Scheme for Wireless Sensor Networks,utside world, they could be vulnerable to physical attacks in the form of node capture or node destruction. These forms of attacks are hard to protect against and require intelligent prevention methods. It is necessary for WSNs to have security measures in place as to prevent an intruder from insert

Scleroderma 发表于 2025-3-29 00:18:39

http://reply.papertrans.cn/87/8634/863331/863331_43.png

苦恼 发表于 2025-3-29 06:05:31

Management of Integrity-Enforced Virtual Applications,n this paper we build on a recently proposed platform that extends this trust on to applications and services. We describe a process that covers the fully integrity-enforcing life-cycle of a trusted virtual application. Our architecture allows applications the safe transition between trusted states,

在前面 发表于 2025-3-29 09:19:09

http://reply.papertrans.cn/87/8634/863331/863331_45.png

plasma 发表于 2025-3-29 14:00:33

Enhancement of Critical Financial Infrastructure Protection Using Trust Management,ity of key financial markets and businesses worldwide. Traditional protection approaches have focused on protecting individual financial institutions (FIs) while ignoring the threats arising from cross-domain interactions as well as those originating from other critical infrastructures. With the gro

floaters 发表于 2025-3-29 19:13:41

http://reply.papertrans.cn/87/8634/863331/863331_47.png

Fecundity 发表于 2025-3-29 20:09:57

http://reply.papertrans.cn/87/8634/863331/863331_48.png

encyclopedia 发表于 2025-3-30 01:40:50

http://reply.papertrans.cn/87/8634/863331/863331_49.png

镇压 发表于 2025-3-30 06:04:38

http://reply.papertrans.cn/87/8634/863331/863331_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Secure and Trust Computing, Data Management, and Applications; STA 2011 Workshops: Changhoon Lee,Jean-Marc Seigneur,Roland R. Wagner Confe