找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security Technology, Disaster Recovery and Business Continuity; International Confer Tai-hoon Kim,Wai-chi Fang,Dominik Ślęzak Conference pr

[复制链接]
楼主: CRUST
发表于 2025-3-25 07:24:18 | 显示全部楼层
Secure OSGi Platform against Service Injection,component based software systems built using OSGi are extensible and adaptable but they entail new types of security concerns. Security concerns in OSGi platforms can be divided into two basic categories: vulnerabilities in Java cross-platform (or multi-platform) technology and vulnerabilities in th
发表于 2025-3-25 08:03:44 | 显示全部楼层
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse,access control. For preventing the abuse of CPU resources, we had earlier proposed a new type of execution resource that controls the maximum CPU usage [5,6] The previously proposed mechanism can control only one process at a time. Because most services involve multiple processes, the mechanism shou
发表于 2025-3-25 14:42:17 | 显示全部楼层
Probabilistic Route Selection Algorithm for IP Traceback, very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection traceback algorithm, namely PRST, to trace the attacker’s real origin. This algorithm uses two types of packets such as an agent p
发表于 2025-3-25 19:38:47 | 显示全部楼层
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection,omain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the invers
发表于 2025-3-25 23:04:00 | 显示全部楼层
发表于 2025-3-26 03:06:36 | 显示全部楼层
Histogram-Based Reversible Data Hiding with Quadtree Concepts,is required to fulfill the goals that at the encoder, the secret information needs to be embedded into the original image by some means, and at the decoder, both the secret information and the original image are required to be correctly extracted and recovered, and they should be identical to their
发表于 2025-3-26 06:59:22 | 显示全部楼层
发表于 2025-3-26 11:33:33 | 显示全部楼层
Performance Analysis of Cyber Security Awareness Delivery Methods,s and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery metho
发表于 2025-3-26 16:14:43 | 显示全部楼层
发表于 2025-3-26 17:48:39 | 显示全部楼层
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence,ber-physical elements with privacy protection. The development of such architecture has the possibility of providing new ways of integrated control into systems where large amounts of fast computation are not easily available, either due to limitations on power, physical size or choice of computing
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-22 06:56
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表