裙带关系 发表于 2025-3-28 18:05:33
The Impact of a Security Model in a Fog Computing Environment,e, speed up awareness and respond quickly to events. IoT aims to bring every object online, thereby generating increasing amounts of data. This exponential growth of network traffic calls for faster, efficient and scalable ways of processing. Critical IoT applications such as health monitoring, emerCHOIR 发表于 2025-3-28 21:49:03
Gotcha-I: A Multiview Human Videos Dataset,le biometric traits as head pose, body gait, eyes, nose, mouth, and further more. All these traits are useful for a multibiometric identification or a person re-identification in a video surveillance context. Body Worn Cameras (BWCs) are used by the police of different countries all around the wordinsecticide 发表于 2025-3-29 01:59:34
Enhancing Enterprise IT Security with a Visualization-Based Process Framework,ative tasks, and improves the manageability of data and devices. The framework, as it was built, and how it can be used is described. The framework provides detailed instructions, makes the current status of the environment visible, and demands participation from stakeholders. With this concept, thedrusen 发表于 2025-3-29 06:01:32
Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit,ed for the development of fast and reliable methods for primality testing to determine whether a given integer is prime or composite. Many algorithms were proposed by to address the efficient method of testing the primality of the integer number. In this paper, we propose a pipelined reconfigurable蚊子 发表于 2025-3-29 09:24:15
http://reply.papertrans.cn/87/8636/863582/863582_45.png防止 发表于 2025-3-29 14:15:11
http://reply.papertrans.cn/87/8636/863582/863582_46.pngcortisol 发表于 2025-3-29 18:22:20
Malware Detection in Android Applications Using Integrated Static Features,atures, most significant ones are selected using Pearson correlation coefficient and N-grams. Each of these features are then integrated and fed to a classifier. The experimental evaluation of the proposed method and comparison with existing methods shows that the proposed framework is better.achlorhydria 发表于 2025-3-29 20:03:23
http://reply.papertrans.cn/87/8636/863582/863582_48.pnglambaste 发表于 2025-3-30 03:14:35
Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions,aScript. We also successfully test the extension in a real online bank. By demonstrating a practical man-in-the-browser attack, our research highlights the need to better monitor and control malicious browser extensions.GRIEF 发表于 2025-3-30 04:18:40
Detection and Analysis of Drive-by Downloads and Malicious Websites,from different standpoints. We provide in-depth understanding of the difficulties in dealing with drive-by downloads and suggest appropriate solutions. We propose machine learning and feature selection solutions to remedy the drive-by download problem. Experimental results reported 98.2% precision, 98.2% F-Measure and 97.2% ROC area.