找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Technology - New Generations; 15th International C Shahram Latifi Conference proceedings 2018 Springer International Publishing

[复制链接]
楼主: EFFCT
发表于 2025-3-26 23:45:27 | 显示全部楼层
Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Featuresclassify samples with similar characteristics into families makes possible to create mitigation strategies that work for a whole class of programs. In this paper, we present a malware family classification approach using VGG16 deep neural network’s bottleneck features. Malware samples are represente
发表于 2025-3-27 04:49:03 | 显示全部楼层
发表于 2025-3-27 05:49:23 | 显示全部楼层
A Self Proxy Signature Scheme Over NTRU Latticesiginal keys by generating temporary key pairs for a time period and then revoke them. The temporary keys can be generated by delegating the signing right to himself. Thus, in SPS the user can prevent the exposure of his private key from repeated use. If we are considering the existence of quantum co
发表于 2025-3-27 11:01:37 | 显示全部楼层
Towards an Ontology of Security Assessment: A Core Model Proposal given that there is an overlap of the “Information Security” and “Systems Assessment” areas, concepts are ambiguous, terminology is confounding, and important concepts are not defined. Nineteen papers on ontology, out of 80 papers of interest, have been selected to be discussed. Most of them are pr
发表于 2025-3-27 14:54:30 | 显示全部楼层
Integration of Mobile Forensic Tool Capabilitiess tools provide important capabilities for digital forensic investigators to extract, examine, and analyze evidence data uncovered from mobile devices. Due to the limitations of various tools, this paper argues for an integrated approach to mobile forensic tool capabilities through combined use of d
发表于 2025-3-27 18:18:53 | 显示全部楼层
发表于 2025-3-27 23:42:41 | 显示全部楼层
发表于 2025-3-28 03:56:34 | 显示全部楼层
发表于 2025-3-28 08:24:24 | 显示全部楼层
发表于 2025-3-28 12:14:15 | 显示全部楼层
Cloud Intrusion Detection and Prevention System for M-Voting Application in South Africa: Suricata v one of the technologies that has emerged. One of the subsets of e-voting is mobile voting. Mobile voting is the use of mobile phones to cast a vote outside the restricted electoral boundaries. Mobile phones are pervasive; they offer connection anywhere, at any time. However, utilising a fast-growin
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 11:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表