用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Risks and Security of Internet and Systems; 13th International C Akka Zemmari,Mohamed Mosbah,Frédéric Cuppens Conference proceedings 2019 S

[复制链接]
楼主: 空隙
发表于 2025-3-28 14:47:17 | 显示全部楼层
Outsourcing Signatures of Confidential Documents, to securely outsource the signature of a confidential document he owns to a digital signature provider. On the one hand, the client gets a valid standard signature of his confidential document while the signature provider learns nothing more from the document than its digest. On the other hand, the
发表于 2025-3-28 19:51:42 | 显示全部楼层
Trust Evaluation Model for Attack Detection in Social Internet of Things,d objects to interact in order to offer a variety of attractive services and applications. However, with this emerging paradigm, people feel wary and cautious. They worry about revealing their data and violating their privacy. Without trustworthy mechanisms to guarantee the reliability of user’s com
发表于 2025-3-28 23:38:17 | 显示全部楼层
发表于 2025-3-29 05:25:38 | 显示全部楼层
Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning,ishing campaigns that are increasingly more targeted and last for increasingly shorter life spans. Browser-based phishing detectors that are specialized for a . set of targeted web sites and that are based . on the overall . of a target could be a very effective tool in this respect. Approaches of t
发表于 2025-3-29 10:48:17 | 显示全部楼层
Privacy Preserving Data Offloading Based on Transformation,ution performance, it raises new challenges regarding security. Privacy leakage risks prevent users from sharing their private data with third-party services. State-of-the-art approaches used for secure data storage are cryptography based, having an overhead of key management as well as do not suppo
发表于 2025-3-29 11:44:49 | 显示全部楼层
DSTC: DNS-Based Strict TLS Configurations,e known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g. non Forward-Secrecy), mainly to provide backward compatibility. This opens doors to downgrade attacks, as is the case of the POODLE attack [.], which exploits the client’s silent fallback to downgrade the p
发表于 2025-3-29 16:24:50 | 显示全部楼层
发表于 2025-3-29 20:25:17 | 显示全部楼层
On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper),anisms in OSNs are either non-existent or not GDPR compliant. While the absence of consent means a lack of control of the OSN user (data subject) on his personal data, non-compliant consent mechanisms can give them a false sense of control, encouraging them to reveal more personal data than they wou
发表于 2025-3-30 00:34:24 | 显示全部楼层
Enhancing Collaboration Between Security Analysts in Security Operations Centers,s paper we explain how a SOC is organized, we highlight the current limitations of SOCs and their consequences regarding the performance of the detection service. We propose a new collaboration process to enhance the cooperation between security analysts in order to quickly process security events a
发表于 2025-3-30 05:44:51 | 显示全部楼层
RIICS: Risk Based IICS Segmentation Method,ping the integrated system secured. Connecting this two totally different networks has numerous benefits and advantages, but introduces several security problems. . is one of the most important security measures that should be applied to integrated ICS systems. This security technique consists essen
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-31 18:49
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表