GULF 发表于 2025-3-30 09:36:00

http://reply.papertrans.cn/89/8829/882873/882873_51.png

浮夸 发表于 2025-3-30 12:51:02

http://reply.papertrans.cn/89/8829/882873/882873_52.png

misshapen 发表于 2025-3-30 19:44:47

Abdolsalam Ebrahimpour,Yousef Karimi Vahed-classification of malicious App families is rarely studied. If we can visualize the Android malicious Apps as color images, we will get more features than using grayscale images. In this paper, a method of color visualization for Android Apps is proposed and implemented. Based on this, combined wit

思考而得 发表于 2025-3-30 22:23:07

http://reply.papertrans.cn/89/8829/882873/882873_54.png

使迷惑 发表于 2025-3-31 02:36:34

Arefeh Hesaraki,Sture Holmbergfects the security of cyberspace. How to detect anonymous network flow to position the anonymous users, is becoming to a research hotspot. However, with rapid development of the encryption and network technology, it is a nontrivial task to detect and position the anonymous user in such a complex net

不要不诚实 发表于 2025-3-31 08:43:17

Farivar Fazelpour,Majid Vafaeipour,Omid Rahbari,Mohammad H. Valizadehal systems. While such systems present substantial security challenges for the host-centric communication with the growing trend of sensor data streams. Information Centric Networking (ICN) architecture suggests features exploitable in ICPS applications, reducing delivery latency and promoting quali

scotoma 发表于 2025-3-31 10:08:57

http://reply.papertrans.cn/89/8829/882873/882873_57.png

Arboreal 发表于 2025-3-31 14:16:07

http://reply.papertrans.cn/89/8829/882873/882873_58.png

全部 发表于 2025-3-31 20:10:19

http://reply.papertrans.cn/89/8829/882873/882873_59.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Sustainability in Energy and Buildings; Proceedings of the 4 Anne Hakansson,Mattias Höjer,Lakhmi C Jain Conference proceedings 2013 Springe