找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Research in Attacks, Intrusions and Defenses; 15th International S Davide Balzarotti,Salvatore J. Stolfo,Marco Cova Conference proceedings

[复制链接]
楼主: Combat
发表于 2025-3-27 00:57:16 | 显示全部楼层
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve ., and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.
发表于 2025-3-27 02:26:10 | 显示全部楼层
发表于 2025-3-27 07:15:58 | 显示全部楼层
Proactive Discovery of Phishing Related Domain Nameshing related activities - “secure”, “banking”, brand names, etc. Once a pro-active blacklist is created, ongoing and daily monitoring of only these domains can lead to the efficient detection of phishing web sites.
发表于 2025-3-27 13:28:17 | 显示全部楼层
DEMACRO: Defense against Malicious Cross-Domain Requestsects potentially malicious cross-domain requests and de-authenticates them by removing existing session credentials. Our system requires no training or user interaction and imposes minimal performance overhead on the user’s browser.
发表于 2025-3-27 17:19:22 | 显示全部楼层
FlashDetect: ActionScript 3 Malware Detectiont 3. . classifies submitted files using a naive Bayesian classifier based on a set of predefined features. Our experiments show that . has high classification accuracy, and that its efficacy is comparable with that of commercial anti-virus products.
发表于 2025-3-27 20:15:07 | 显示全部楼层
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols n-gram analysis on real-life environments. Our tests show that the analyzed systems, in presence of data with high variability, cannot deliver high detection and low false positive rates at the same time.
发表于 2025-3-28 01:21:33 | 显示全部楼层
发表于 2025-3-28 02:32:45 | 显示全部楼层
发表于 2025-3-28 07:21:32 | 显示全部楼层
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)bedding support for their local languages and using a larger set of phrases. Similarly, uploading a photo of valuable items on social networks can also incentivize crime. Moreover, sleeping and drinking patterns identified from uploads, can help criminals in planning their crime execution hours.
发表于 2025-3-28 11:02:51 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-7 16:59
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表