標(biāo)題: Titlebook: Applications and Techniques in Information Security; International Confer Lynn Batten,Gang Li,Matthew Warren Conference proceedings 2014 Sp [打印本頁(yè)] 作者: fundoplication 時(shí)間: 2025-3-21 16:42
書(shū)目名稱(chēng)Applications and Techniques in Information Security影響因子(影響力)
書(shū)目名稱(chēng)Applications and Techniques in Information Security影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Applications and Techniques in Information Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Applications and Techniques in Information Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Applications and Techniques in Information Security被引頻次
書(shū)目名稱(chēng)Applications and Techniques in Information Security被引頻次學(xué)科排名
書(shū)目名稱(chēng)Applications and Techniques in Information Security年度引用
書(shū)目名稱(chēng)Applications and Techniques in Information Security年度引用學(xué)科排名
書(shū)目名稱(chēng)Applications and Techniques in Information Security讀者反饋
書(shū)目名稱(chēng)Applications and Techniques in Information Security讀者反饋學(xué)科排名
作者: 泰然自若 時(shí)間: 2025-3-21 23:25 作者: corpuscle 時(shí)間: 2025-3-22 04:29
A Competitive Three-Level Pruning Technique for Information Securityollowing three categories: ranking based, clustering based, and optimization based methods. The present paper introduces and investigates a new pruning technique. It is called a Three-Level Pruning Technique, TLPT, because it simultaneously combines all three approaches in three levels of the proces作者: 會(huì)議 時(shí)間: 2025-3-22 05:42
Popularity Prediction of Tianya BBS Posts Based on User Behaviorpropose a popularity prediction model based on user behavior and historical information given by early popularity. Our approach is validated on datasets consisting of posts on Tianya BBS. Our experimental results show that the prediction accuracy is significantly improved with existing methods. We a作者: 是比賽 時(shí)間: 2025-3-22 11:51
Design and Implementation of Network User Behaviors Analysis Based on Hadoop for Big Dataer behaviors to prevent the potential threats. However, the user behaviors are dynamic which is difficult to capture the users’ comprehensive behaviors in a single device by capturing or collecting the static dataset. More specially, the increase of the network users, network traffic and network ser作者: compassion 時(shí)間: 2025-3-22 16:37 作者: 怎樣才咆哮 時(shí)間: 2025-3-22 18:25 作者: 變異 時(shí)間: 2025-3-22 22:28 作者: 殺人 時(shí)間: 2025-3-23 02:06 作者: 強(qiáng)行引入 時(shí)間: 2025-3-23 07:53
Modeling and Analysis of Network Survivability under Attack Propagationo correlated faults from the natural disasters and malicious attack. Particularly, malicious attacks attract more attention rather than natural disasters recently. This paper investigates network survivability in the presence of network attack propagation. Especially, a continuous-time Markov chain 作者: grovel 時(shí)間: 2025-3-23 12:32
A Scalable Approach for Vulnerability Discovery Based on Security Patchesde reuse by programmers. Security patches are often not propagated to all code clones, however they could be leveraged to discover unknown vulnerabilities. Static auditing approaches are frequently proposed to scan code for security flaws, unfortunately, they often generate too many false positives.作者: 白楊 時(shí)間: 2025-3-23 16:32 作者: fender 時(shí)間: 2025-3-23 21:25 作者: 玩忽職守 時(shí)間: 2025-3-23 22:22 作者: CANT 時(shí)間: 2025-3-24 05:51 作者: Excise 時(shí)間: 2025-3-24 07:25 作者: 傳染 時(shí)間: 2025-3-24 12:54 作者: 揉雜 時(shí)間: 2025-3-24 17:44
A Novel Method for Detecting Double Compressed Facebook JPEG Images research assumes that the investigator can confiscate every piece of evidence and hence overlooks the fact that the original image is difficult to obtain. Because Facebook applies a Discrete Cosine Transform (DCT)-based compression on uploaded images, we are able to detect the modified images which作者: GNAT 時(shí)間: 2025-3-24 21:22
Using Randomization to Attack Similarity Digestsanges in a file result in small changes in the digest. These schemes are useful in security and forensic applications. We examine how well three similarity digest schemes (Ssdeep, Sdhash and TLSH) work when exposed to random change. Various file types are tested by randomly manipulating source code,作者: 解凍 時(shí)間: 2025-3-24 23:29 作者: Self-Help-Group 時(shí)間: 2025-3-25 03:34 作者: Outspoken 時(shí)間: 2025-3-25 08:11
1865-0929 l papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.978-3-662-45669-9978-3-662-45670-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: monogamy 時(shí)間: 2025-3-25 14:14 作者: 祖?zhèn)髫?cái)產(chǎn) 時(shí)間: 2025-3-25 17:14
Emotion and Reason in Social Change new experiments presented in this paper show that the TLPT is competitive in comparison to EPIC, KMP and DHCEP, and can achieve better outcomes. These experimental results demonstrate the effectiveness of the TLPT technique in this example of information security application.作者: Morose 時(shí)間: 2025-3-25 23:09
WWI: Love and Sorrow Exhibition,h keywords, user shopping trends, website posts and replies, and web visited history to acquire the uses’ dynamic behaviors. To evaluate our system, we capture the packets in the campus networks, and the results show that our system can capture the users’ long-term behaviors and acquire the user behaviors in detail.作者: corn732 時(shí)間: 2025-3-26 00:40 作者: 向下五度才偏 時(shí)間: 2025-3-26 04:55
https://doi.org/10.1007/978-3-319-41316-7pose an algorithm to infer whether the given image is double compressed without referring to the original image. To demonstrate the correctness of our algorithm, we correctly predict the number of compressions being applied to a Facebook image.作者: foliage 時(shí)間: 2025-3-26 11:18 作者: LUDE 時(shí)間: 2025-3-26 16:34 作者: 磨坊 時(shí)間: 2025-3-26 17:20
Analysis on the Reliability of Non-repairable and Repairable Network Storage Systemsations were carried out to measure a number of reliability indices of the network storage systems. These indices, including availability, mean time to first failure, and the mean up time, are used for analysis and comparison of simulation data. This analysis can provide useful guidance for designing future network storage systems.作者: 駕駛 時(shí)間: 2025-3-27 00:16
A Novel Method for Detecting Double Compressed Facebook JPEG Imagespose an algorithm to infer whether the given image is double compressed without referring to the original image. To demonstrate the correctness of our algorithm, we correctly predict the number of compressions being applied to a Facebook image.作者: inveigh 時(shí)間: 2025-3-27 04:01
1865-0929 ional Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applic作者: CLAY 時(shí)間: 2025-3-27 09:03 作者: 漂泊 時(shí)間: 2025-3-27 10:47 作者: foreign 時(shí)間: 2025-3-27 15:36
Popularity Prediction of Tianya BBS Posts Based on User Behaviorts consisting of posts on Tianya BBS. Our experimental results show that the prediction accuracy is significantly improved with existing methods. We also analyze the influence of the temporal waveform of information diffusion for the linear prediction model.作者: Afflict 時(shí)間: 2025-3-27 20:05 作者: Modify 時(shí)間: 2025-3-28 00:07 作者: 極大的痛苦 時(shí)間: 2025-3-28 03:45
https://doi.org/10.1057/9780230502581rity model for enhancing Android security. Our security framework assigns security level to application at installation and performs runtime monitoring. We describe an implementation of our security framework, and finally evaluate the security and performance.作者: HEDGE 時(shí)間: 2025-3-28 08:32
Emotion and the Contemporary Museume feature information of the target surface is extracted. The result of simulation shows that the target surface information extraction algorithm for chest bitmap is characterized by low-complexity, short time-consuming and high efficiency, and meets the real-time requirement.作者: PANEL 時(shí)間: 2025-3-28 14:04 作者: 丑惡 時(shí)間: 2025-3-28 18:35 作者: 刀鋒 時(shí)間: 2025-3-28 21:56 作者: archenemy 時(shí)間: 2025-3-29 00:13 作者: crucial 時(shí)間: 2025-3-29 06:24 作者: limber 時(shí)間: 2025-3-29 07:17 作者: 機(jī)警 時(shí)間: 2025-3-29 12:34 作者: Senescent 時(shí)間: 2025-3-29 18:48
The Research of Extraction Algorithm for Target Feature of Chest Bitmape feature information of the target surface is extracted. The result of simulation shows that the target surface information extraction algorithm for chest bitmap is characterized by low-complexity, short time-consuming and high efficiency, and meets the real-time requirement.作者: nauseate 時(shí)間: 2025-3-29 23:47
A Method for Detecting Trojan Based on Hidden Network Traffic Analysisrating system and the hardware are reduced to a black box with two end points. Hidden traffic can be easily extracted regardless of the Trojan hidden technologies. After this, a special-Trojan detection system based on the extraction of the hidden traffic is present. The experimental result has demonstrated the usage of the traffic extract model.作者: Herd-Immunity 時(shí)間: 2025-3-30 02:23 作者: 增長(zhǎng) 時(shí)間: 2025-3-30 04:58 作者: 愛(ài)花花兒憤怒 時(shí)間: 2025-3-30 10:38
Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com include a recent real-world case study to demonstrate the relevancy and applicability of our methodology. In this case study, a suspect attempts to evade detection via use of anti-forensics which demonstrates the capability and awareness of evasion techniques used by students.作者: 正式通知 時(shí)間: 2025-3-30 16:06
Using Randomization to Attack Similarity Digestshashing schemes (spam images). The experiments expose shortcomings in the Sdhash and Ssdeep schemes that can be exploited in straight forward ways. The results suggest that the TLSH scheme is more robust to the attacks and random changes considered.作者: 熒光 時(shí)間: 2025-3-30 18:57
Applications and Techniques in Information SecurityInternational Confer作者: DEAWL 時(shí)間: 2025-3-30 21:12 作者: burnish 時(shí)間: 2025-3-31 02:45
https://doi.org/10.1007/978-94-015-8579-8icate the scheme with immunized state is more survivable than the scheme without immunized state, which is not only helpful to the survivability of network design but also useful to choose the suitable repair strategies.作者: 占線 時(shí)間: 2025-3-31 06:12
https://doi.org/10.1007/978-3-030-59924-9 positives. Besides, we mitigate the path explosion problem by backward data tracing in concolic execution. We conducted experiments with real world open source projects (Linux Ubuntu OS distributions and program packages) and we reported 7 real vulnerabilities out of 63 code clones found in Ubuntu 作者: 芳香一點(diǎn) 時(shí)間: 2025-3-31 11:01
An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithis paper we propose a sequential pattern approach based on DPMM for IWA identification. Firstly, we analyze the user behavior of potential IWA and get a feature vector of user behavior. Secondly, we use DPMM to get effective and accurate clustering results. Finally, we use the sequential pattern min作者: 監(jiān)禁 時(shí)間: 2025-3-31 15:58
Modeling and Analysis of Network Survivability under Attack Propagationicate the scheme with immunized state is more survivable than the scheme without immunized state, which is not only helpful to the survivability of network design but also useful to choose the suitable repair strategies.作者: HEED 時(shí)間: 2025-3-31 21:15
A Scalable Approach for Vulnerability Discovery Based on Security Patches positives. Besides, we mitigate the path explosion problem by backward data tracing in concolic execution. We conducted experiments with real world open source projects (Linux Ubuntu OS distributions and program packages) and we reported 7 real vulnerabilities out of 63 code clones found in Ubuntu 作者: anaerobic 時(shí)間: 2025-4-1 01:42 作者: 公豬 時(shí)間: 2025-4-1 04:53
Communications in Computer and Information Sciencehttp://image.papertrans.cn/a/image/159236.jpg作者: 幻影 時(shí)間: 2025-4-1 07:51 作者: 捏造 時(shí)間: 2025-4-1 12:47 作者: circuit 時(shí)間: 2025-4-1 17:46
https://doi.org/10.1057/9780230502581of android device is proposed to solve this problem. This mechanism?is based on the existing?system. The existing Android?system framework?layer and application layer are modified and extended by using ?a control terminal application to control hardware and authorization, the system boot process, Sy作者: keloid 時(shí)間: 2025-4-1 22:21
https://doi.org/10.1057/9780230502581ternet. Smartphones are getting closer to our daily life, and at the same time security threats to privacy of smartphone users continue to proliferate at a rapid rate. Android is the most popular target of attackers among other mobile platforms. Although the Android provides permission based securit