標(biāo)題: Titlebook: Advances in Security Technology; International Confer Haeng-kon Kim,Tai-hoon Kim,Akingbehin Kiumi Conference proceedings 2009 Springer-Verl [打印本頁(yè)] 作者: 鳥場(chǎng) 時(shí)間: 2025-3-21 17:22
書目名稱Advances in Security Technology影響因子(影響力)
書目名稱Advances in Security Technology影響因子(影響力)學(xué)科排名
書目名稱Advances in Security Technology網(wǎng)絡(luò)公開度
書目名稱Advances in Security Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Security Technology被引頻次
書目名稱Advances in Security Technology被引頻次學(xué)科排名
書目名稱Advances in Security Technology年度引用
書目名稱Advances in Security Technology年度引用學(xué)科排名
書目名稱Advances in Security Technology讀者反饋
書目名稱Advances in Security Technology讀者反饋學(xué)科排名
作者: 性別 時(shí)間: 2025-3-21 22:56 作者: Tracheotomy 時(shí)間: 2025-3-22 02:06 作者: 真繁榮 時(shí)間: 2025-3-22 04:45 作者: 入伍儀式 時(shí)間: 2025-3-22 09:13
Research on Streaming Data Integration System about Security Threat Monitor,e network security is very noteworthy to study. An increasing number of network security systems have been deployed in the backbone and the gateways of enterprises, including various Netflow systems, IDS, VDS, VS and firewalls. These products make great contributions in enhancing the network securit作者: 無(wú)情 時(shí)間: 2025-3-22 13:14
Using Honeypots to Secure E-Government Networks, issues. As a result, citizens want to trust on a secured E-government network. Generally, E-government security and E-commerce security are the same, but E-government has some extra features. Usually government agencies can cooperate better than businesses, because, most of them are connected to fo作者: Acquired 時(shí)間: 2025-3-22 18:05
Trust-Risk-Game Based Access Control in Cross Domain Application,nd unknown peers worsen security problems. Traditional access control mechanisms are not suitable to distributed environment. Several models and mechanisms make use of trust evaluation to assist access control decision. But few explicitly consider trust and risk as two separate factors which affect 作者: Enzyme 時(shí)間: 2025-3-22 23:22 作者: hypotension 時(shí)間: 2025-3-23 03:53
Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Developmenthe problem of determining the scope and construction sequence of a software, but most of them lack ease of use from the developer’s perspective. In this paper, we present an approach to determine software construction sequences which emphasizes easiness from the developers’ point of view and a cont作者: mercenary 時(shí)間: 2025-3-23 07:59
Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study tensive application and sophisticated techniques of analysis and interpretation. Informative techniques and feedback mechanisms that help to assess how well and efficiently a specific development methodology is performing are still scanty. Analyzing project tasks would enhance how well individual ta作者: 代理人 時(shí)間: 2025-3-23 12:07
A Secured Technique for Image Data Hiding, image file keeping two considerations in mind which are Size and Degree of Security. At the source, the image which is to be hidden (target image) is encoded at the end of another image (cover image). Double layer security of the hidden image can be achieved (over the untrusted network) by; firstly作者: 損壞 時(shí)間: 2025-3-23 15:22
Computational Science – ICCS 2020nd data integration technologies, GS-TMS provides a desirable capability in quickly building a large-scale distributed network monitoring system. Furthermore, GS-TMS has additional notable advantages over current monitoring systems in scalability and flexibility.作者: 憲法沒有 時(shí)間: 2025-3-23 20:28 作者: 細(xì)胞學(xué) 時(shí)間: 2025-3-23 23:49
Research on Streaming Data Integration System about Security Threat Monitor,nd data integration technologies, GS-TMS provides a desirable capability in quickly building a large-scale distributed network monitoring system. Furthermore, GS-TMS has additional notable advantages over current monitoring systems in scalability and flexibility.作者: ambivalence 時(shí)間: 2025-3-24 04:13 作者: Pde5-Inhibitors 時(shí)間: 2025-3-24 08:35
VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions,sy spam reporter”. This module enables victims to report spam contents to the administrator directly. The reported contents and information, of course, are shared with other domains as a black list. Through the experimental result, we showed this system is enough to prevent, detect, and block VoIP spam.作者: 方舟 時(shí)間: 2025-3-24 11:40 作者: 從屬 時(shí)間: 2025-3-24 16:06
Using Honeypots to Secure E-Government Networks,rnment networks is used to design a honeynet for tracing hackers. Because of possible damages to this network, it must be fault tolerance. This framework provides interesting resources for hackers and at the same time it prevents them from misusing those resources for future attacks.作者: gerrymander 時(shí)間: 2025-3-24 19:12
Impossible Differential Characteristics of Extended Feistel Networks with Provable Security againstlysis can be evaluated by impossible differential characteristics [1]. In this paper, we will first examine the security of Extended Feistel Networks (EFN) against DC and then use the .-method introduced in [1] to find impossible differential characteristics of EFN.作者: Amenable 時(shí)間: 2025-3-25 02:42 作者: 牙齒 時(shí)間: 2025-3-25 05:31
Bidirectional Quantum Secure Direct Communication Based on Entanglement,es have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. Security analysis indicates that this scheme is secure against the present Trojan horse attack and the current attack strategyand it can also ensure the security of the messages in a low noisy channel.作者: REP 時(shí)間: 2025-3-25 11:19 作者: DRILL 時(shí)間: 2025-3-25 12:37 作者: COST 時(shí)間: 2025-3-25 18:58
Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Developmenrolled experiment based on this approach with professionals who have had at least two years of experience in software projects. The results obtained from this experiment show that our approach enables developers to define construction sequences more precisely than with other ad-hoc techniques.作者: 馬具 時(shí)間: 2025-3-25 22:28
A Secured Technique for Image Data Hiding,, the starting point of encoding the image data is depended on the size of the images and it is stored within the encoded image at the end of its header information as a cipher text.; secondly, the target image is hidden behind the cover image by following our encrypted image hiding technique.作者: MENT 時(shí)間: 2025-3-26 02:15
Ahmad Abdelfattah,Stan Tomov,Jack Dongarrasy spam reporter”. This module enables victims to report spam contents to the administrator directly. The reported contents and information, of course, are shared with other domains as a black list. Through the experimental result, we showed this system is enough to prevent, detect, and block VoIP spam.作者: Isometric 時(shí)間: 2025-3-26 06:58
Vladislava Churuksaeva,Alexander Starchenkoy an individual by comparing the feature obtained from the feature extraction algorithm with the previously stored feature by producing a similarity score. This score will be indicating the degree of similarity between a pair of biometrics data under consideration. Depending on degree of similarity, individual can be identified.作者: 杠桿 時(shí)間: 2025-3-26 12:01 作者: 并排上下 時(shí)間: 2025-3-26 16:14 作者: LUCY 時(shí)間: 2025-3-26 16:48
Andrey Epikhin,Matvey Kraposhinross-layered permission assignment is devised based on some popular information security models such as RBAC, DTE and etc. And a corresponding prototype system is implemented based on Linux. Finally, some preliminary test results are analyzed and further research directions are pointed out.作者: 蠟燭 時(shí)間: 2025-3-26 20:57 作者: paltry 時(shí)間: 2025-3-27 02:26
Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux,ross-layered permission assignment is devised based on some popular information security models such as RBAC, DTE and etc. And a corresponding prototype system is implemented based on Linux. Finally, some preliminary test results are analyzed and further research directions are pointed out.作者: 意見一致 時(shí)間: 2025-3-27 09:14
Trust-Risk-Game Based Access Control in Cross Domain Application,represent the confidence in the peer. To appease people’s anxiety about loss, a model of risk assessment is also presented to indicate impacts on resources. At the end of this paper, to describe how our mechanism works, a scenario is provided.作者: 災(zāi)禍 時(shí)間: 2025-3-27 12:04 作者: beta-cells 時(shí)間: 2025-3-27 17:16
Vladislava Churuksaeva,Alexander Starchenkot (Iris Images) by using a set of properly located sensors. We are considering camera as a high quality sensor. Iris Images are typically color images that are processed to gray scale images. Then the Feature extraction algorithm is used to detect “IRIS Effective Region (IER)” and then extract featu作者: Femish 時(shí)間: 2025-3-27 21:50
Lecture Notes in Computer Science In this scheme the messages are encoded in the entanglement state. our scheme has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. Security analysis indicates that this sc作者: syncope 時(shí)間: 2025-3-27 23:35
Andrey Epikhin,Matvey Kraposhinty. Nowadays, Linux is becoming more and more popular for its excellent performance and open source philosophy. Meanwhile, access control mechanisms of Linux have been improved ceaselessly to satisfy arisen security requirements. For instance, SELinux is integrated into Linux kernel 2.6 and it can e作者: 行業(yè) 時(shí)間: 2025-3-28 02:44 作者: 大漩渦 時(shí)間: 2025-3-28 07:40
Dariusz Sychel,Przemys?aw Kl?sk,Aneta Bera issues. As a result, citizens want to trust on a secured E-government network. Generally, E-government security and E-commerce security are the same, but E-government has some extra features. Usually government agencies can cooperate better than businesses, because, most of them are connected to fo作者: Assault 時(shí)間: 2025-3-28 13:52 作者: Affluence 時(shí)間: 2025-3-28 17:31 作者: Constant 時(shí)間: 2025-3-28 20:03
Vishal Raul,Leifur Leifsson,Slawomir Kozielthe problem of determining the scope and construction sequence of a software, but most of them lack ease of use from the developer’s perspective. In this paper, we present an approach to determine software construction sequences which emphasizes easiness from the developers’ point of view and a cont作者: STEER 時(shí)間: 2025-3-29 00:04 作者: theta-waves 時(shí)間: 2025-3-29 04:02
Thomas McSweeney,Neil Walton,Mawussi Zounon image file keeping two considerations in mind which are Size and Degree of Security. At the source, the image which is to be hidden (target image) is encoded at the end of another image (cover image). Double layer security of the hidden image can be achieved (over the untrusted network) by; firstly作者: Amorous 時(shí)間: 2025-3-29 08:27
https://doi.org/10.1007/978-3-642-10240-0access control; biometrics; cognition; communication; cryptanalysis; data hiding; e-government; iris recogn作者: 無(wú)節(jié)奏 時(shí)間: 2025-3-29 14:17
978-3-642-10239-4Springer-Verlag Berlin Heidelberg 2009作者: 同謀 時(shí)間: 2025-3-29 19:09 作者: 吞下 時(shí)間: 2025-3-29 20:44
1865-0929 Overview: 978-3-642-10239-4978-3-642-10240-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 顯示 時(shí)間: 2025-3-30 00:55 作者: Thyroiditis 時(shí)間: 2025-3-30 06:46
Andrzej Bielecki,Maciej GierdziewiczIn 2007, Wen . proposed a novel elliptic curve dynamic access control system. In this paper, we will show that the scheme is vulnerable to various attacks.作者: craven 時(shí)間: 2025-3-30 08:43 作者: 通知 時(shí)間: 2025-3-30 15:11
10樓作者: 肌肉 時(shí)間: 2025-3-30 18:10
10樓