找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Secure IT Systems; 24th Nordic Conferen Aslan Askarov,René Rydhof Hansen,Willard Rafnsson Conference proceedings 2019 Springer Nature Switz

[复制链接]
楼主: informed
发表于 2025-3-26 23:15:48 | 显示全部楼层
Analysis of Topology Poisoning Attacks in Software-Defined Networkinga secure control channel. While this architecture avoids many security issues of distributed routing protocols, SDN remains vulnerable to topology poisoning attacks during topology discovery. Faked link information can cause wrong routing decisions by the controller and, thus, enable the attacker to
发表于 2025-3-27 03:01:35 | 显示全部楼层
Client-Side Vulnerabilities in Commercial VPNse client’s traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client’s real IP address from online services, and they also shield the user’s connections from perceived threats in the access networks. In this paper, we study the security of such commercial VPN service
发表于 2025-3-27 08:29:27 | 显示全部楼层
Securing Optical Networks by Modern Cryptographic Techniquesptical networks are based on cryptographic technology. Various security solutions using cryptographic techniques have been adapted in current optical networks. In this paper, we investigate advanced cryptographic techniques to ensure the long-term security of optical networks.
发表于 2025-3-27 12:21:33 | 显示全部楼层
A Roadmap for Improving the Impact of Anti-ransomware Researchntinually growing and costly threat across the globe, therefore efforts have been made both in academia and industry to develop techniques that can help to detect and recover from ransomware attacks. This paper aims to provide an overview of the current landscape of Windows-based anti-ransomware too
发表于 2025-3-27 13:39:21 | 显示全部楼层
An Experimental Analysis of Cryptojacking Attackstal analysis of how different types of cryptojacking attacks impact a selection of consumer-grade devices, and the perceived annoyance by the user. This is seen in relation to the expected cost and revenue the attacker would expect. The results show that a well-configured cryptojacking attack does n
发表于 2025-3-27 19:48:24 | 显示全部楼层
My Smartwatch Is Mine – Machine Learning Based Theft Detection of Smartwatchesent a first machine learning based theft detection approach running in a user’s domain, relying solely on data of his smartwatch and thus not involving third parties. Hence, we collect data from multiple persons to first show that there is an exploitable structure within data provided by a smartwatc
发表于 2025-3-28 01:55:32 | 显示全部楼层
发表于 2025-3-28 03:25:10 | 显示全部楼层
A Study of Security Vulnerabilities and Software Weaknesses in Vehicles information is gathered for 60 vehicle OEMs (Original Equipment Manufacturers) and common vehicle components from the National Vulnerability Database (NVD). Each vulnerability (CVE) is analyzed with respect to its software weakness type (CWE) and severity score (CVSS). 44 unique CVEs were found in
发表于 2025-3-28 08:33:29 | 显示全部楼层
Experimental Analysis of the Laser-Induced Instruction Skip Fault Modeluction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Several research works assessed a fault model that consists in a single instruction skip, i.e. the ability to prevent one chosen instruction in a program from being executed. This assessm
发表于 2025-3-28 13:21:19 | 显示全部楼层
Can Microkernels Mitigate Microarchitectural Attacks? on the Genode microkernel framework using three different kernels, Okl4, Nova, and Linux. We try to answer the question whether the strict process separation provided by Genode combined with security-oriented kernels such as Okl4 and Nova can mitigate microarchitectural attacks. We evaluate the att
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-7 00:11
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表