找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Practice and Experience; First International Robert H. Deng,Feng Bao,Jianying Zhou Conference proceedings 2005 Spring

[复制链接]
楼主: choleric
发表于 2025-3-28 17:49:59 | 显示全部楼层
Robust Routing in Malicious Environment for Ad Hoc Networkse simulation results that demonstrate that our approach increases the throughput by at least ten percent in a network where fifty percent of the nodes are malicious when compared to an approach that selects the shortest route. Furthermore, our approach incurs only a small delay when compared to the delay along the shortest route.
发表于 2025-3-28 19:53:47 | 显示全部楼层
Measuring Resistance to Social Engineeringountermeasures, we need a SE resistance metric. This paper de.nes such a metric. We have also implemented software to obtain metric test data. A real life SE experiment involving 120 participants has been completed. The experiment suggests that SE may indeed represent an Achilles heel.
发表于 2025-3-29 00:28:52 | 显示全部楼层
Model Redundancy vs. Intrusion Detectionand after model redundancy is compared. The preliminary experimental results show that the model redundancy in the behavior model is useful to detect novel intrusions, but the model redundancy due to the overlapping distinguishability among features is insignificant for intrusion detection.
发表于 2025-3-29 05:26:43 | 显示全部楼层
0302-9743 f information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologi
发表于 2025-3-29 10:34:41 | 显示全部楼层
发表于 2025-3-29 13:59:27 | 显示全部楼层
发表于 2025-3-29 18:04:41 | 显示全部楼层
发表于 2025-3-29 21:15:29 | 显示全部楼层
Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Methodrabilities are explored, and associated techniques are provided to mitigate these vulnerabilities. We also analyzed the existing architecture types of AAA integrated network security solutions, 802.1X and VPNs. We have extensively analyzed the effect of crypto parameters over WLAN based on packet le
发表于 2025-3-30 03:53:03 | 显示全部楼层
Robust Routing in Malicious Environment for Ad Hoc Networks authenticity of the route. Availability of the network in a malicious environment has largely been ignored..In this paper, we divide the secure routing problem into two layers. The first layer provides authenticated routing and the second layer provides a route selection algorithm that selects a ro
发表于 2025-3-30 06:40:13 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 11:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表