找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communication Technology; Third IFIP TC 5/8 In Ismail Khalil,Erich Neuhold,Ilsun You Conference proceedings 2015 IFIP Inter

[复制链接]
楼主: Sparkle
发表于 2025-3-26 21:50:36 | 显示全部楼层
Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter. The method allows distinguishing type of detected SYN flood attacks – random, subnet or fixed. Based on Counting Bloom filter, the attack detection and identification algorithm is proposed, implemented and evaluated in KaTaLyzer network traffic monitoring tool. Proof of correctness of the approach
发表于 2025-3-27 01:42:06 | 显示全部楼层
发表于 2025-3-27 08:02:23 | 显示全部楼层
Making Computer Science Education Relevantrogramming projects on themes that are relevant for young people. The motivation for theme-driven programmers is not to practice coding but to create a digital artefact related to a domain they are interested in and they want to learn about. Necessary programming concepts are learned on the way (“di
发表于 2025-3-27 09:44:06 | 显示全部楼层
Analyzing Brain Waves for Activity Recognition of Learners the activities of learners by their brain wave data for estimating the states. In analyses on brain wave data, generally, some particular bands such as . and . are considered as the features. The authors considered other bands of higher and lower frequencies to compensate for the coarseness of simp
发表于 2025-3-27 14:46:38 | 显示全部楼层
A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transm to be very vulnerable - easily affected by different attacks, especially those happening over transmission network. In this work, we have proposed a novel multi-factor biometric based remote authentication protocol. This protocol is not only resistant against attacks on the network but also protec
发表于 2025-3-27 21:39:03 | 显示全部楼层
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algority applications to support human activity which one of the applications is web browser applications. People spend much time on browsing activity for finding useful information that they are interested on it. It is not easy to find the particular pieces of information that they interested on it. In th
发表于 2025-3-27 22:56:23 | 显示全部楼层
Strength of Relationship Between Multi-labeled Data and Labelsclassified to categories and annotated with labels of those categories. Giving ranks to labels of objects in order to express how close objects are to the categories enables us to use objects more precisely. When target objects are identified by a set of labels ., there are various strength of relat
发表于 2025-3-28 02:05:05 | 显示全部楼层
Online Ad-fraud in Search Engine Advertising Campaignss of 28 companies, we analyse the incident of a hacked campaign-account. We describe the occurred damage, i.e. (1) follow-up consequences of unauthorized access to the account of the advertiser, and (2) limited availability of short-term online campaigns. This contribution aims at raising awareness
发表于 2025-3-28 08:15:04 | 显示全部楼层
发表于 2025-3-28 12:39:47 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 08:15
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表