裙带关系 发表于 2025-3-28 18:05:33

The Impact of a Security Model in a Fog Computing Environment,e, speed up awareness and respond quickly to events. IoT aims to bring every object online, thereby generating increasing amounts of data. This exponential growth of network traffic calls for faster, efficient and scalable ways of processing. Critical IoT applications such as health monitoring, emer

CHOIR 发表于 2025-3-28 21:49:03

Gotcha-I: A Multiview Human Videos Dataset,le biometric traits as head pose, body gait, eyes, nose, mouth, and further more. All these traits are useful for a multibiometric identification or a person re-identification in a video surveillance context. Body Worn Cameras (BWCs) are used by the police of different countries all around the word

insecticide 发表于 2025-3-29 01:59:34

Enhancing Enterprise IT Security with a Visualization-Based Process Framework,ative tasks, and improves the manageability of data and devices. The framework, as it was built, and how it can be used is described. The framework provides detailed instructions, makes the current status of the environment visible, and demands participation from stakeholders. With this concept, the

drusen 发表于 2025-3-29 06:01:32

Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit,ed for the development of fast and reliable methods for primality testing to determine whether a given integer is prime or composite. Many algorithms were proposed by to address the efficient method of testing the primality of the integer number. In this paper, we propose a pipelined reconfigurable

蚊子 发表于 2025-3-29 09:24:15

http://reply.papertrans.cn/87/8636/863582/863582_45.png

防止 发表于 2025-3-29 14:15:11

http://reply.papertrans.cn/87/8636/863582/863582_46.png

cortisol 发表于 2025-3-29 18:22:20

Malware Detection in Android Applications Using Integrated Static Features,atures, most significant ones are selected using Pearson correlation coefficient and N-grams. Each of these features are then integrated and fed to a classifier. The experimental evaluation of the proposed method and comparison with existing methods shows that the proposed framework is better.

achlorhydria 发表于 2025-3-29 20:03:23

http://reply.papertrans.cn/87/8636/863582/863582_48.png

lambaste 发表于 2025-3-30 03:14:35

Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions,aScript. We also successfully test the extension in a real online bank. By demonstrating a practical man-in-the-browser attack, our research highlights the need to better monitor and control malicious browser extensions.

GRIEF 发表于 2025-3-30 04:18:40

Detection and Analysis of Drive-by Downloads and Malicious Websites,from different standpoints. We provide in-depth understanding of the difficulties in dealing with drive-by downloads and suggest appropriate solutions. We propose machine learning and feature selection solutions to remedy the drive-by download problem. Experimental results reported 98.2% precision, 98.2% F-Measure and 97.2% ROC area.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Security in Computing and Communications; 7th International Sy Sabu M. Thampi,Gregorio Martinez Perez,Danda B. Ra Conference proceedings 20