找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Network and System Security; 9th International Co Meikang Qiu,Shouhuai Xu,Haibo Zhang Conference proceedings 2015 Springer International Pu

[复制链接]
楼主: 脾气好
发表于 2025-3-28 15:49:07 | 显示全部楼层
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approachoth within and across app boundaries. This gives rise to various security and privacy risks, including not only intentional collusion attacks via permission re-delegation but also inadvertent disclosure of information and service misuse through confused deputy attacks. In this paper, we revisit the
发表于 2025-3-28 19:44:43 | 显示全部楼层
Android Botnets: What URLs are Telling Uss. Due to its popularity, Android mobile Operating System became the most targeted platform. In spite of rising numbers, there is a significant gap in understanding the nature of mobile botnets and their communication characteristics. In this paper, we address this gap and provide a deep analysis of
发表于 2025-3-28 23:14:10 | 显示全部楼层
发表于 2025-3-29 03:14:28 | 显示全部楼层
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devicesas social security numbers and health records. This makes these devices a lucrative target for attacks exploiting vulnerabilities to inject malicious code or reuse existing code to alter the execution of their software. Existing defense techniques have major drawbacks such as requiring source code o
发表于 2025-3-29 07:14:02 | 显示全部楼层
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memorythe literature such as PassPoints, DAS, Cued Click Points, GeoPass and so on. These schemes reported promising performance in their studies in the aspects of security and usability, however, we notice that these GP schemes may suffer from the issue of multiple password memory. In our first user stud
发表于 2025-3-29 12:23:22 | 显示全部楼层
Indicators of Malicious SSL Connectionssh between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious SSL connections, which is based on the unencrypted part of SSL (i.e., the SSL handshake protocol). We provide strong evidence for the strength of our i
发表于 2025-3-29 17:43:00 | 显示全部楼层
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexingks. Orientation field is able to be reconstructed by either non-parameterized or parameterized methods. In this paper, we propose a new parameterized approach for orientation field modeling. The proposed algorithm minimizes a composite model including three constraints corresponding to a least squar
发表于 2025-3-29 23:01:32 | 显示全部楼层
A Framework for Policy Similarity Evaluation and Migration Based on Change Detectionand scenarios, enterprises no longer function in isolation. Being able to measure policy similarity and integrate heterogeneous policies appropriately is an essential step towards secure interoperation. Existing approaches for measuring policy similarity are based on computing similarity between dif
发表于 2025-3-30 00:39:36 | 显示全部楼层
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trustuiring resources to be shared across tenant boundaries. Currently, cloud IaaS providers focus on multi-tenant isolation, and offer limited or no cross-tenant access capabilities in their IaaS APIs. In this paper, we present a novel attribute-based access control (ABAC) model to enable collaboration
发表于 2025-3-30 06:31:21 | 显示全部楼层
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networkso approximately . groups of interest a day. To demonstrate Dandelion’s value, we show how our system has provided the critical information necessary to human analysts in detecting and mitigating previously unknown mobile attacks.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-12 07:46
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表