找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security in Computing and Communications; 7th International Sy Sabu M. Thampi,Gregorio Martinez Perez,Danda B. Ra Conference proceedings 20

[复制链接]
楼主: LANK
发表于 2025-3-28 18:05:33 | 显示全部楼层
The Impact of a Security Model in a Fog Computing Environment,e, speed up awareness and respond quickly to events. IoT aims to bring every object online, thereby generating increasing amounts of data. This exponential growth of network traffic calls for faster, efficient and scalable ways of processing. Critical IoT applications such as health monitoring, emer
发表于 2025-3-28 21:49:03 | 显示全部楼层
Gotcha-I: A Multiview Human Videos Dataset,le biometric traits as head pose, body gait, eyes, nose, mouth, and further more. All these traits are useful for a multibiometric identification or a person re-identification in a video surveillance context. Body Worn Cameras (BWCs) are used by the police of different countries all around the word
发表于 2025-3-29 01:59:34 | 显示全部楼层
Enhancing Enterprise IT Security with a Visualization-Based Process Framework,ative tasks, and improves the manageability of data and devices. The framework, as it was built, and how it can be used is described. The framework provides detailed instructions, makes the current status of the environment visible, and demands participation from stakeholders. With this concept, the
发表于 2025-3-29 06:01:32 | 显示全部楼层
Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit,ed for the development of fast and reliable methods for primality testing to determine whether a given integer is prime or composite. Many algorithms were proposed by to address the efficient method of testing the primality of the integer number. In this paper, we propose a pipelined reconfigurable
发表于 2025-3-29 09:24:15 | 显示全部楼层
发表于 2025-3-29 14:15:11 | 显示全部楼层
发表于 2025-3-29 18:22:20 | 显示全部楼层
Malware Detection in Android Applications Using Integrated Static Features,atures, most significant ones are selected using Pearson correlation coefficient and N-grams. Each of these features are then integrated and fed to a classifier. The experimental evaluation of the proposed method and comparison with existing methods shows that the proposed framework is better.
发表于 2025-3-29 20:03:23 | 显示全部楼层
发表于 2025-3-30 03:14:35 | 显示全部楼层
Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions,aScript. We also successfully test the extension in a real online bank. By demonstrating a practical man-in-the-browser attack, our research highlights the need to better monitor and control malicious browser extensions.
发表于 2025-3-30 04:18:40 | 显示全部楼层
Detection and Analysis of Drive-by Downloads and Malicious Websites,from different standpoints. We provide in-depth understanding of the difficulties in dealing with drive-by downloads and suggest appropriate solutions. We propose machine learning and feature selection solutions to remedy the drive-by download problem. Experimental results reported 98.2% precision, 98.2% F-Measure and 97.2% ROC area.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-24 18:15
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表