极大痛苦 发表于 2025-3-25 07:24:18
Secure OSGi Platform against Service Injection,component based software systems built using OSGi are extensible and adaptable but they entail new types of security concerns. Security concerns in OSGi platforms can be divided into two basic categories: vulnerabilities in Java cross-platform (or multi-platform) technology and vulnerabilities in th容易懂得 发表于 2025-3-25 08:03:44
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse,access control. For preventing the abuse of CPU resources, we had earlier proposed a new type of execution resource that controls the maximum CPU usage The previously proposed mechanism can control only one process at a time. Because most services involve multiple processes, the mechanism shouOmniscient 发表于 2025-3-25 14:42:17
Probabilistic Route Selection Algorithm for IP Traceback, very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection traceback algorithm, namely PRST, to trace the attacker’s real origin. This algorithm uses two types of packets such as an agent pcloture 发表于 2025-3-25 19:38:47
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection,omain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the inversHEED 发表于 2025-3-25 23:04:00
http://reply.papertrans.cn/87/8635/863443/863443_25.png与野兽博斗者 发表于 2025-3-26 03:06:36
Histogram-Based Reversible Data Hiding with Quadtree Concepts,is required to fulfill the goals that at the encoder, the secret information needs to be embedded into the original image by some means, and at the decoder, both the secret information and the original image are required to be correctly extracted and recovered, and they should be identical to theirEndometrium 发表于 2025-3-26 06:59:22
http://reply.papertrans.cn/87/8635/863443/863443_27.pngFriction 发表于 2025-3-26 11:33:33
Performance Analysis of Cyber Security Awareness Delivery Methods,s and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery metho使苦恼 发表于 2025-3-26 16:14:43
http://reply.papertrans.cn/87/8635/863443/863443_29.pngcreditor 发表于 2025-3-26 17:48:39
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence,ber-physical elements with privacy protection. The development of such architecture has the possibility of providing new ways of integrated control into systems where large amounts of fast computation are not easily available, either due to limitations on power, physical size or choice of computing