找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Risks and Security of Internet and Systems; 9th International Co Javier Lopez,Indrajit Ray,Bruno Crispo Conference proceedings 2015 Springe

[复制链接]
楼主: NK871
发表于 2025-3-28 16:34:46 | 显示全部楼层
发表于 2025-3-28 22:17:25 | 显示全部楼层
Privacy Issues in Geosocial Networks,k is getting stronger due to the swift development of GSNs and mobile technologies. Indeed, the gathered location information generates a huge amount of publicly-available location data, information that was always considered private or at least known only by friends or family. Hence, a serious priv
发表于 2025-3-28 23:21:47 | 显示全部楼层
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks,rs have about privacy, most social networks offer ways to control the privacy of the user. Unfortunately, we believe that current privacy settings are not as effective as users might think..In this paper, we highlight this problem focusing on one of the most popular social networks, Facebook. In par
发表于 2025-3-29 06:25:20 | 显示全部楼层
Latent Semantic Analysis for Privacy Preserving Peer Feedback,Unfortunately, this new option comes with significantly increased risks to the privacy of the feedback requester as well as the peers involved in the feedback process. In fact, peers may unintentionally disclose personal information which may cause great threats to them like cyber-bullying, which in
发表于 2025-3-29 09:37:48 | 显示全部楼层
发表于 2025-3-29 14:32:45 | 显示全部楼层
发表于 2025-3-29 15:55:02 | 显示全部楼层
发表于 2025-3-29 20:30:33 | 显示全部楼层
Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks,ey are very expensive and powerful attack tools to defend against. Since the vulnerability is not known in advance, there is no reliable way to guard against zero-day attacks before they happen. Attackers take advantage of the unknown nature of zero-day exploits and use them in conjunction with high
发表于 2025-3-30 00:07:38 | 显示全部楼层
Practical Attacks on Virtual Worlds,ecurity issues affect VWs, and they are vulnerable to a range of attacks on their infrastructure and communications channels. Their powerful architecture can also be used to mount attacks against live Real World servers, by using malicious VW objects. Researching these attacks in commercial VWs woul
发表于 2025-3-30 06:01:00 | 显示全部楼层
TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks,rgence of various anti-phishing tools, not only there has been a dramatic increase in the number of phishing attacks but also more sophisticated forms of these attacks have come into existence. One of these forms of phishing attacks is the tabnabbing attack. Tabnabbing takes advantage of the user’s
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-18 14:22
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表