找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security Technology, Disaster Recovery and Business Continuity; International Confer Tai-hoon Kim,Wai-chi Fang,Dominik Ślęzak Conference pr

[复制链接]
楼主: CRUST
发表于 2025-3-23 13:46:05 | 显示全部楼层
MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology,posed system also supports rapid system call analysis environment. We implement our malware analysis system (referred as MAS) on the KVM hypervisor with Intel VT-x virtualization support. Our experiments with benchmarks show that the proposed system provides efficient analysis environment with low overhead.
发表于 2025-3-23 17:45:47 | 显示全部楼层
Performance Analysis of Cyber Security Awareness Delivery Methods,ds such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.
发表于 2025-3-23 19:43:44 | 显示全部楼层
发表于 2025-3-24 00:36:59 | 显示全部楼层
发表于 2025-3-24 03:15:52 | 显示全部楼层
发表于 2025-3-24 09:03:51 | 显示全部楼层
发表于 2025-3-24 13:00:53 | 显示全部楼层
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP, to a single common list. Thus ., the proportion of the distinguished points, must be determined cautiously by considering performance and communication overload. We propose a practical method to determine an optimal . by taking account of both communication overload and computational efficiency und
发表于 2025-3-24 15:27:38 | 显示全部楼层
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Polmation security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies and Practices (ISMSPP) on information security. This research has been conducted on the telecommunication industry of Pakistan that was ranked 9. glob
发表于 2025-3-24 19:35:18 | 显示全部楼层
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON,amage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the performance of the secure OS in detail, and the relati
发表于 2025-3-25 02:13:12 | 显示全部楼层
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device,resources such as small memory size and low battery capacity, simple and efficient method is needed to lessen much effort for preventing this illegal activity. Therefore, we discuss a protection technique taking into account these considerations. In our method, sample bytes are extracted from an imp
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-22 06:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表