找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cyber Security; 18th China Annual Co Wei Lu,Yuqing Zhang,Chao Li Conference proceedings‘‘‘‘‘‘‘‘ 2022 The Editor(s) (if applicable) and The

[复制链接]
楼主: TUMOR
发表于 2025-3-25 06:43:12 | 显示全部楼层
发表于 2025-3-25 10:21:20 | 显示全部楼层
Efficient Classification of Darknet Access Activity with Partial Trafficumption and is as accuracy as prior work. Besides, in order to keep up with the users’ real access activity, we simulate new and old user by simply whether delete the cached consensus document before each access and apply our approach. The experiment results confirm that there does exist a window of
发表于 2025-3-25 13:20:02 | 显示全部楼层
Research and Application of Security Situation Awareness Platform for Large Enterprises to improve the security management level of large enterprises, the construction of safety management system which takes the safety situation awareness platform as the command core is puts forward. The technical framework, evolution route, main functions, core technologies and three-stage models of
发表于 2025-3-25 19:52:19 | 显示全部楼层
Research on the Relationship Between Chinese Nicknames and Accounts in Social Networksthe same time. Therefore, there are many virtual identities belonging to one person on the Internet, and the similarity analysis of cross-platform network identities is of great significance in the field of network security. This paper studied the Chinese user nicknames and virtual identity recognit
发表于 2025-3-25 21:05:47 | 显示全部楼层
TFC: Defending Against SMS Fraud via a Two-Stage Algorithmontact victims. Due to the tiny amount compared with normal SMS, the high proportion of malicious adversarial characters, and the lack of knowledge to specific fraud types, it is still challenging to identify the fraud SMS efficiently. In this paper, we firstly conduct a measurement study to explore
发表于 2025-3-26 03:12:16 | 显示全部楼层
发表于 2025-3-26 05:01:28 | 显示全部楼层
Smart Contract Vulnerability Detection Based on Symbolic Execution Technologye and nearly at an average of thousands per day. However, the correctness and security of the smart contract itself are facing huge problems. The well-known DAO vulnerability, and Parity multi-signature wallet’ vulnerabilities have leaded to a hundreds of millions dollars loss, and they are both cau
发表于 2025-3-26 09:18:20 | 显示全部楼层
On Testing the RE Hypothesis: A Surveyieve the traceability capabilities and ensure the reliable storage of medical data records on blockchain. Data desensitization provides a certain degree of security for sensitive data involving personal information in medical data. The introduction of attribute encryption has solved the problem of u
发表于 2025-3-26 13:00:34 | 显示全部楼层
Anne Volbeda,Juan C. Fontecilla-Campsr fingerprints. We found 66.6% of the websites performing fingerprinting and revealed how browser fingerprinting is applied in real-world websites. We also showed that FPFlow could prevent browser fingerprinting with an acceptable overhead.
发表于 2025-3-26 17:04:16 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-23 17:55
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表