標(biāo)題: Titlebook: Advances in Intelligent Systems and Applications - Volume 2; Proceedings of the I Jeng-Shyang Pan,Ching-Nung Yang,Chia-Chen Lin Conference [打印本頁(yè)] 作者: Osteopenia 時(shí)間: 2025-3-21 16:20
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2影響因子(影響力)
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2被引頻次
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2被引頻次學(xué)科排名
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2年度引用
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2年度引用學(xué)科排名
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2讀者反饋
書(shū)目名稱(chēng)Advances in Intelligent Systems and Applications - Volume 2讀者反饋學(xué)科排名
作者: 恃強(qiáng)凌弱 時(shí)間: 2025-3-21 21:23
A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols,ctive adversary can not only track a tag via successful or unsuccessful identifications with legal or illegal readers but also perform a compromised attack. In . 2003, Weis et al. used the technique of the randomized hash lock to design a privacy-preserving protocol against such active adversaries. 作者: Mobile 時(shí)間: 2025-3-22 03:31 作者: Overdose 時(shí)間: 2025-3-22 05:46
Cryptanalysis on the User Authentication Scheme with Anonymity,sers obtain services only after they are authenticated. Remote user authentication scheme provides the server a convenient way to authenticate users before they are allowed to access database and obtain services. For the sake of security, anonymity is an important requirement for some user authentic作者: Lament 時(shí)間: 2025-3-22 10:30
Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections, no non-interactive deniable authentication protocols are proposed to provide anonymity and fair protection both for senders and receivers. A noninteractive deniable authentication protocol with anonymity and fair protection is proposed to improve performance. Moreover, our protocol provides confide作者: 流眼淚 時(shí)間: 2025-3-22 13:02 作者: FOVEA 時(shí)間: 2025-3-22 19:48 作者: In-Situ 時(shí)間: 2025-3-23 00:58
Impact of Identifier-Locator Split Mechanism on DDoS Attacks, hindering the development of current Internet. Therefore, the identifier-locator split mapping network which separates the identifier role and the locator role of an IP address has become one of the most-watched techniques in the field of future Internet architecture. However, DDoS attacks are stil作者: ATOPY 時(shí)間: 2025-3-23 03:45
Detecting Web-Based Botnets with Fast-Flux Domains, malicious transmissions in a vast amount of normal traffic that is not easily detectable. In addition, integrating with fast-flux domain technology, botnet may use a web server to issue attack commands and fast-flux technology to extend the lifespan of the malicious website. This study conducts ano作者: 瑪瑙 時(shí)間: 2025-3-23 08:20
Improvements of Attack-Defense Trees for Threat Analysis,nt. Therefore, Protection Trees (PT) have been developed to migrate the system weaknesses against attacks. However, existing protection trees scheme provided a converse approach to counter against attacks, ignored the interactions between threats and defenses. Accordingly, the present study proposes作者: 不規(guī)則 時(shí)間: 2025-3-23 12:23 作者: Mangle 時(shí)間: 2025-3-23 15:20
Performance Evaluation on Permission-Based Detection for Android Malware,ty of detecting malicious applications in Android operating system based on permissions. Compare against previous researches, we collect a relative large number of benign and malicious applications (124,769 and 480, respectively) and conduct experiments based on the collected samples. In addition to作者: conformity 時(shí)間: 2025-3-23 21:50 作者: Interim 時(shí)間: 2025-3-23 23:24
Digital Watermarking Based on JND Model and QR Code Features, parts. First, Using JND Model to find the JND map of images and using Sobel operation to find contour of images. Second, find the area there QR Code will embed by scanning the JND map and contour of images with the mask. Finally, in order to hide QR Codes in Images, we adjust the pixel value in the作者: Osteons 時(shí)間: 2025-3-24 04:40
Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme,limited to a fixed range, the visual quality of the stego-image is very good and is independent of the volume of the embedded data. In this paper, we have proposed an extra information-free multi-dimensional multi-layer data embedding scheme, which improves two aspects of Wang et al.’s scheme. First作者: Laconic 時(shí)間: 2025-3-24 10:35 作者: 植物學(xué) 時(shí)間: 2025-3-24 14:04
Theoretical Analysis and Realistic Implementation of Secure Servers Switching System,ons with endless streams of security mechanisms should be employed attentively to reduce the loss of data due to successful intrusion attacks on any system. This paper focus on the implementation of an embedded system technology developed in a host control module group in which the entire server ach作者: 易于交談 時(shí)間: 2025-3-24 16:21
Design and Implementation of a Self-growth Security Baseline Database for Automatic Security Auditiseline database a crucial research domain. In this paper, we proposed a security baseline database to assist information security auditors to maintain the security update patch baseline automatically with the help of the Microsoft knowledge base and automatic audit process. A practical implementatio作者: 止痛藥 時(shí)間: 2025-3-24 19:04
Conference proceedings 2013ea are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Syste作者: exacerbate 時(shí)間: 2025-3-25 01:59 作者: Painstaking 時(shí)間: 2025-3-25 05:45 作者: champaign 時(shí)間: 2025-3-25 10:56 作者: 前面 時(shí)間: 2025-3-25 14:52 作者: 空洞 時(shí)間: 2025-3-25 19:37
Jo?o J.M. Ferreira,Mário Raposo,Attila Vargaieves coordinated group allocation of resources combined with a larger number of group hosts designed to meet demand. The security server switching system uses server load balancing to prevent system failures, errors, and interruptions, accompanied with the ever so important theory of fault-tolerance for grace degradation purposes.作者: CULP 時(shí)間: 2025-3-25 21:53
A Novel Authentication Scheme Based on Torus Automorphism for Smart Card,recovered image should be the same as the photograph printed on the card. The combination of the image encryption using torus automorphism and secret sharing provides high security for the proposed authentication scheme.作者: patella 時(shí)間: 2025-3-26 02:25 作者: 野蠻 時(shí)間: 2025-3-26 04:20
Digital Watermarking Based on JND Model and QR Code Features, area QR Code embedded and add in invisible watermark and verify information for security propose..Experimental results showed that the proposed method performs better than the way that puts QR Code in the image without processing, we can not only hide QR Code into images but also the QR Code can be detected clearly.作者: CERE 時(shí)間: 2025-3-26 08:47 作者: 使出神 時(shí)間: 2025-3-26 13:10
Theoretical Analysis and Realistic Implementation of Secure Servers Switching System,ieves coordinated group allocation of resources combined with a larger number of group hosts designed to meet demand. The security server switching system uses server load balancing to prevent system failures, errors, and interruptions, accompanied with the ever so important theory of fault-tolerance for grace degradation purposes.作者: 規(guī)范要多 時(shí)間: 2025-3-26 19:05
Incentives to Form Research Joint Ventures Igive their security proofs to support their claim. However, we find that their scheme is not as secure as the authors claimed. In this paper, we give comments on the paper of Choi et al. including the cryptanalysis of their scheme and the weakness of the security proof.作者: squander 時(shí)間: 2025-3-26 21:36
Cooperation in Research and Developmentrnet and the identifier-locator split mapping network. In particular, the numerical analysis and simulation show that the identifier-locator split mapping network alleviates DDoS attacks more effectively, compared with the current Internet.作者: 美麗的寫(xiě) 時(shí)間: 2025-3-27 03:39
Cooperation in Value-Creating Networks domains to identify a botnet either using HTTP as control and command channel or using fast-flux domain for cloaking. Based on the experiments on both testbed and real network environments, the results prove that the proposed method can effectively identify these botnets.作者: FUSC 時(shí)間: 2025-3-27 07:44
Josef Wieland,Robert L. Hellpapermeasures associated with each of attack path. Defense evaluation metrics for each node for probabilistic analysis is used to assisting defender simulate the attack results. Finally, a case of threat analysis of typical cyber security attack is given to demonstrate our approach.作者: 縫紉 時(shí)間: 2025-3-27 11:58
Filippo Aureli,Colleen Schaffner ID-verifier transfer and challenge-response protocols. Moreover, the proposed scheme can satisfy the security requirements of RFID. Performance analysis and function comparisons demonstrate that the proposed scheme is well suited for RFID tags with the scarceness of resources.作者: SOBER 時(shí)間: 2025-3-27 14:15
Carel P. van Schaik,Peter M. Kappelerhares of a (. ′, .) secret sharing; while at the same time, maintain the original secret. Since . ′?., there are redundant shares. We also include discussion on how to select the new threshold . ′ in order to detect and identify cheaters successfully.作者: 飾帶 時(shí)間: 2025-3-27 20:45 作者: anthropologist 時(shí)間: 2025-3-27 22:30
Josef Wieland,Robert L. Hellpapd implement an inkernel Intrusion Prevention System in Gigabit network using commodity hardware and Linux operating systems. Preliminary experiment results show that, our system outperforms traditional intrusion prevention system (snort inline) substantially. Besides, our system can reach the wire speed under a typical set of detection rules.作者: Blanch 時(shí)間: 2025-3-28 02:29 作者: GREG 時(shí)間: 2025-3-28 07:50
https://doi.org/10.1007/978-3-642-56553-3nformation to be transmitted to the receiver through the secure channel. The experimental results demonstrated that the proposed scheme can achieve a higher hiding capacity and a lower distortion than Wang et al.’s scheme without transmitting any extra information.作者: ALT 時(shí)間: 2025-3-28 12:20 作者: fatty-streak 時(shí)間: 2025-3-28 15:17
,An Extension of Harn-Lin’s Cheater Detection and Identification,hares of a (. ′, .) secret sharing; while at the same time, maintain the original secret. Since . ′?., there are redundant shares. We also include discussion on how to select the new threshold . ′ in order to detect and identify cheaters successfully.作者: 或者發(fā)神韻 時(shí)間: 2025-3-28 21:09
Cryptanalysis on the User Authentication Scheme with Anonymity,smart card based authentication schemes. In this article, we show that their scheme cannot resist impersonation attack, denial-of-service attack and guessing attack. Furthermore, the scheme suffers high hash computation overhead and validations steps redundancy.作者: aristocracy 時(shí)間: 2025-3-28 23:00
Design and Implementation of a Linux Kernel Based Intrusion Prevention System in Gigabit Network Usd implement an inkernel Intrusion Prevention System in Gigabit network using commodity hardware and Linux operating systems. Preliminary experiment results show that, our system outperforms traditional intrusion prevention system (snort inline) substantially. Besides, our system can reach the wire speed under a typical set of detection rules.作者: 單純 時(shí)間: 2025-3-29 05:05
Performance Evaluation on Permission-Based Detection for Android Malware, show that a permission-based detector can detect more than 81% of malicious samples. However, due to its precision, we conclude that a permission-based mechanism can be used as a quick filter to identify malicious applications. It still requires a second pass to make complete analysis to a reported malicious application.作者: GLUE 時(shí)間: 2025-3-29 09:56
Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme,nformation to be transmitted to the receiver through the secure channel. The experimental results demonstrated that the proposed scheme can achieve a higher hiding capacity and a lower distortion than Wang et al.’s scheme without transmitting any extra information.作者: 不如屎殼郎 時(shí)間: 2025-3-29 13:18
Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme,give their security proofs to support their claim. However, we find that their scheme is not as secure as the authors claimed. In this paper, we give comments on the paper of Choi et al. including the cryptanalysis of their scheme and the weakness of the security proof.作者: 磨碎 時(shí)間: 2025-3-29 17:39
Impact of Identifier-Locator Split Mechanism on DDoS Attacks,rnet and the identifier-locator split mapping network. In particular, the numerical analysis and simulation show that the identifier-locator split mapping network alleviates DDoS attacks more effectively, compared with the current Internet.作者: 有斑點(diǎn) 時(shí)間: 2025-3-29 23:08
Detecting Web-Based Botnets with Fast-Flux Domains, domains to identify a botnet either using HTTP as control and command channel or using fast-flux domain for cloaking. Based on the experiments on both testbed and real network environments, the results prove that the proposed method can effectively identify these botnets.作者: 某人 時(shí)間: 2025-3-30 03:48
Improvements of Attack-Defense Trees for Threat Analysis,ermeasures associated with each of attack path. Defense evaluation metrics for each node for probabilistic analysis is used to assisting defender simulate the attack results. Finally, a case of threat analysis of typical cyber security attack is given to demonstrate our approach.作者: 粘連 時(shí)間: 2025-3-30 07:31
2190-3018 held December 12-14, 2012 in Hualien, Taiwan.Written by exp.?.The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from m作者: TOXIN 時(shí)間: 2025-3-30 11:56
Rongzhi Liu,Haiyan Zhang,Zhi Yang the security update patch baseline automatically with the help of the Microsoft knowledge base and automatic audit process. A practical implementation demonstrates that the proposed structure is both useful and effective.作者: Sigmoidoscopy 時(shí)間: 2025-3-30 13:05 作者: Enliven 時(shí)間: 2025-3-30 20:17 作者: Intact 時(shí)間: 2025-3-30 20:50 作者: PHIL 時(shí)間: 2025-3-31 04:20
A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols,base instead of a static approach. For privacy, our protocol obtains the same privacy level as the protocol of Weis et al.. For performance, the amortized cost of tag identification of our protocol is almost twice the optimal amortized cost by a competitive analysis. For practical implementation, ou作者: Metastasis 時(shí)間: 2025-3-31 07:49
Cooperation in Primates and Humansbase instead of a static approach. For privacy, our protocol obtains the same privacy level as the protocol of Weis et al.. For performance, the amortized cost of tag identification of our protocol is almost twice the optimal amortized cost by a competitive analysis. For practical implementation, ou作者: 知識(shí) 時(shí)間: 2025-3-31 10:59
2190-3018 d Programming Language.?.This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the af978-3-662-52331-5978-3-642-35473-1Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: Verify 時(shí)間: 2025-3-31 14:50 作者: Forage飼料 時(shí)間: 2025-3-31 21:07 作者: Anecdote 時(shí)間: 2025-3-31 22:42
Cooperation in Primates and Humansctive adversary can not only track a tag via successful or unsuccessful identifications with legal or illegal readers but also perform a compromised attack. In . 2003, Weis et al. used the technique of the randomized hash lock to design a privacy-preserving protocol against such active adversaries.