書目名稱Applied Cryptography and Network Security Workshops影響因子(影響力)學(xué)科排名
書目名稱Applied Cryptography and Network Security Workshops網(wǎng)絡(luò)公開度
書目名稱Applied Cryptography and Network Security Workshops網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applied Cryptography and Network Security Workshops被引頻次
書目名稱Applied Cryptography and Network Security Workshops被引頻次學(xué)科排名
書目名稱Applied Cryptography and Network Security Workshops年度引用
書目名稱Applied Cryptography and Network Security Workshops年度引用學(xué)科排名
書目名稱Applied Cryptography and Network Security Workshops讀者反饋
書目名稱Applied Cryptography and Network Security Workshops讀者反饋學(xué)科排名
作者: Crohns-disease 時(shí)間: 2025-3-22 00:19
Towards Blockchained Challenge-Based Collaborative Intrusion Detectionnge-based CIDN framework. Our evaluation shows that blockchain technology has the potential to enhance the robustness of challenge-based CIDNs in the aspects of trust management (i.e., enhancing the detection of insider nodes) and alarm aggregation (i.e., identifying untruthful inputs).作者: cancer 時(shí)間: 2025-3-22 02:06
Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Setomplete knowledge of the system dynamics, the present work proposes a logical analysis of data (LAD) based fault detection scheme. The proposed scheme identifies the minimal set of sensors for FDIA resiliency and detects the state (faulty or healthy) of the power network relying on the measurements 作者: 脖子 時(shí)間: 2025-3-22 06:39
Strong Leakage Resilient Encryption by Hiding Partial Ciphertextteal information regarding this well-protected partial ciphertext or the secret key. We remark that, the size of such well-protected small portion of ciphertext is chosen to be much larger than the leakage threshold. We provide concrete and practical examples of such more secure hardware resource fo作者: 無意 時(shí)間: 2025-3-22 10:24 作者: 品嘗你的人 時(shí)間: 2025-3-22 15:31
Editing, summary and redrafting,nge-based CIDN framework. Our evaluation shows that blockchain technology has the potential to enhance the robustness of challenge-based CIDNs in the aspects of trust management (i.e., enhancing the detection of insider nodes) and alarm aggregation (i.e., identifying untruthful inputs).作者: 分期付款 時(shí)間: 2025-3-22 18:55
Discourse analysis: speech and writingomplete knowledge of the system dynamics, the present work proposes a logical analysis of data (LAD) based fault detection scheme. The proposed scheme identifies the minimal set of sensors for FDIA resiliency and detects the state (faulty or healthy) of the power network relying on the measurements 作者: evasive 時(shí)間: 2025-3-23 00:56
Discourse analysis: speech and writingteal information regarding this well-protected partial ciphertext or the secret key. We remark that, the size of such well-protected small portion of ciphertext is chosen to be much larger than the leakage threshold. We provide concrete and practical examples of such more secure hardware resource fo作者: 橫條 時(shí)間: 2025-3-23 03:23
Applied Cryptography and Network Security WorkshopsACNS 2019 Satellite 作者: packet 時(shí)間: 2025-3-23 08:52
https://doi.org/10.1007/978-3-030-29729-9artificial intelligence; authentication; cloud computing; computer networks; computer systems; cryptograp作者: Ccu106 時(shí)間: 2025-3-23 13:11 作者: 安裝 時(shí)間: 2025-3-23 16:12 作者: 刪減 時(shí)間: 2025-3-23 21:12 作者: 休戰(zhàn) 時(shí)間: 2025-3-24 00:56 作者: 表主動(dòng) 時(shí)間: 2025-3-24 06:19 作者: SCORE 時(shí)間: 2025-3-24 08:38 作者: Liberate 時(shí)間: 2025-3-24 14:33
The Funerary Elegy in Its Ritual Context,in to store and access security events. The security events included in the blockchain are contributed by a number of IoT sentinels in charge of protecting a group of IoT devices. A key feature here is that the blockchain guarantees a secure registry of security events. Additionally, the proposal pe作者: Isthmus 時(shí)間: 2025-3-24 15:22 作者: hardheaded 時(shí)間: 2025-3-24 21:10 作者: 保守 時(shí)間: 2025-3-25 02:22
Discourse analysis: speech and writingnts improve the reliability of protection methods. Usage of ICT tools for communicating sensor measurement in power networks demands immunity and resiliency of the associated protection scheme against false data injection attack (FDIA). Immunity against malicious manipulation of sensor information i作者: 花費(fèi) 時(shí)間: 2025-3-25 07:06 作者: 謊言 時(shí)間: 2025-3-25 07:29 作者: 自傳 時(shí)間: 2025-3-25 15:33 作者: conference 時(shí)間: 2025-3-25 19:39
Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context r sessions context, such as IP ranges and Browser type. On the other hand, behavioral dynamics such as mouse and keyword features have been proposed in order to improve authentication, but have been shown most effective only in continuous authentication scenarios. In this paper we propose to combine作者: 驚惶 時(shí)間: 2025-3-25 23:15
Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacksto . (MLaaSs). Meticulously crafted malicious inputs can be used to mislead and confuse the learning model, even in cases where the adversary only has limited access to input and output labels. As a result, there has been an increased interest in defence techniques to combat these types of attacks. 作者: 多產(chǎn)子 時(shí)間: 2025-3-26 00:56 作者: 繼承人 時(shí)間: 2025-3-26 05:48 作者: Impugn 時(shí)間: 2025-3-26 10:11
A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equationsent a new type of PoW, which relies on the hardness of solving a set of random quadratic equations over the finite field GF(2). We will present the advantages of such a PoW, in particular, in terms of its impact on decentralization and the incentives involved, and therefore demonstrate that this is 作者: Concerto 時(shí)間: 2025-3-26 14:27 作者: 功多汁水 時(shí)間: 2025-3-26 20:15
Towards Blockchained Challenge-Based Collaborative Intrusion Detectionious organizations with the purpose of detecting any potential threats. While such systems and networks are usually vulnerable to insider attacks, some kinds of trust mechanisms should be integrated in a real-world application. Challenge-based trust mechanisms are one promising solution, which can m作者: 教唆 時(shí)間: 2025-3-26 23:46
Enhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems their MAC addresses. Although several initiatives have been proposed by scientific community to properly address authentication by strongly preserving privacy, there are still improvements and steps that need to be developed as it is not clearly stated what would occur if a device is lost, stole or作者: 表示問 時(shí)間: 2025-3-27 04:25
Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Setnts improve the reliability of protection methods. Usage of ICT tools for communicating sensor measurement in power networks demands immunity and resiliency of the associated protection scheme against false data injection attack (FDIA). Immunity against malicious manipulation of sensor information i作者: 教義 時(shí)間: 2025-3-27 08:24
Strong Leakage Resilient Encryption by Hiding Partial Ciphertextong leakage setting to counter backdoor (or Trojan horse) plus covert channel attack, by relaxing the restrictions on leakage. We allow . leakage at . and . and over .. Our leakage threshold (e.g. 10000 bits) could be much larger than typical secret key (e.g. AES key or RSA private key) size. Under 作者: infinite 時(shí)間: 2025-3-27 10:54
Conference proceedings 2019Security and Privacy.PriDA 2019:.First InternationalWorkshop on Privacy-preserving Distributed Data?Analysis.SiMLA 2019:?.First International Workshop on Security in Machine Learning and?its Applications.作者: Condescending 時(shí)間: 2025-3-27 16:46
0302-9743 on Cloud Security and Privacy.PriDA 2019:.First InternationalWorkshop on Privacy-preserving Distributed Data?Analysis.SiMLA 2019:?.First International Workshop on Security in Machine Learning and?its Applications.978-3-030-29728-2978-3-030-29729-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 誤傳 時(shí)間: 2025-3-27 17:46 作者: 滲入 時(shí)間: 2025-3-27 22:49 作者: outrage 時(shí)間: 2025-3-28 03:27 作者: Allergic 時(shí)間: 2025-3-28 06:37 作者: Nonflammable 時(shí)間: 2025-3-28 14:21 作者: DRILL 時(shí)間: 2025-3-28 15:05 作者: 刪減 時(shí)間: 2025-3-28 19:11
Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context earning techniques that aim at high accuracy, and only occasionally raise alarms for manual inspection. Our combined approach achieves an AUC of 0.957. We discuss the practicality of our approach in industrial contexts.作者: delegate 時(shí)間: 2025-3-29 01:55
Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks accomplish our aim by (1) preventing the attacker from correctly learning the labels and approximating the architecture of the black-box system; (2) luring the attacker away, towards a decoy model, using .; and finally (3) creating infeasible computational work for the adversary.作者: Palpable 時(shí)間: 2025-3-29 03:17 作者: inspiration 時(shí)間: 2025-3-29 09:17 作者: 玩忽職守 時(shí)間: 2025-3-29 13:21
0302-9743 etwork Security, ACNS 2019, in Bogota, Colombia, in June 2019.?.The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops:.AIBlock 2019:?.First International Workshop on Application Intelligence and Blockchain Security.AIo