標(biāo)題: Titlebook: Artificial Intelligence and Security; 5th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2019 Springer Nat [打印本頁] 作者: Motion 時間: 2025-3-21 16:41
書目名稱Artificial Intelligence and Security影響因子(影響力)
書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence and Security被引頻次
書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Security年度引用
書目名稱Artificial Intelligence and Security年度引用學(xué)科排名
書目名稱Artificial Intelligence and Security讀者反饋
書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名
作者: Neutropenia 時間: 2025-3-21 20:41 作者: MIME 時間: 2025-3-22 02:35 作者: ostracize 時間: 2025-3-22 04:41 作者: linear 時間: 2025-3-22 12:28 作者: Bph773 時間: 2025-3-22 15:54 作者: Banquet 時間: 2025-3-22 17:02
A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHEd decryption, and then the partial sharing decryption is proposed. Performance analysis illustrated that the proposed scheme is feasible and the complexity expands. Under the universal composability frame, the proposed protocol is also proved to be semantically secure.作者: indemnify 時間: 2025-3-22 21:14
Conference proceedings 20199 submissions. The papers were organized in topical sections as follows:..Part I: cloud computing;. Part II: artificial intelligence; big data; and cloud computing and security;. Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity;. Part IV: encryption and cybersecurity..作者: macabre 時間: 2025-3-23 05:24 作者: Integrate 時間: 2025-3-23 06:49
https://doi.org/10.1007/1-56898-635-1cture of the application. The samples with low-frequency path are preferably selected during the sample selection phase using simulated annealing and genetic algorithms. The experimental results on the LAVA-M dataset justify the better performance of the proposed GVDM model, which finds more vulnerabilities than other fuzzers with high accuracy.作者: Psychogenic 時間: 2025-3-23 12:18
Informationstechnik und Datenverarbeitungy, and can maximize the utilization efficiency of quantum resources. With a rigorous security analysis, we proves that this protocol can defend against JM attacks, entanglement measurement attacks and external attacks.作者: 窒息 時間: 2025-3-23 15:20
,Einführung: Programme und Algorithmen,ed attack method with a power trace. Then the countermeasure of equivalent power consumption at atomic level is given by adding empty operations in point doubling and addition operations for hardware devices of blockchain.作者: engagement 時間: 2025-3-23 22:02 作者: 跟隨 時間: 2025-3-24 01:36
A Gray-Box Vulnerability Discovery Model Based on Path Coveragecture of the application. The samples with low-frequency path are preferably selected during the sample selection phase using simulated annealing and genetic algorithms. The experimental results on the LAVA-M dataset justify the better performance of the proposed GVDM model, which finds more vulnerabilities than other fuzzers with high accuracy.作者: glucagon 時間: 2025-3-24 04:38
Multi-function Quantum Cryptography Protocol Based on Bell Statey, and can maximize the utilization efficiency of quantum resources. With a rigorous security analysis, we proves that this protocol can defend against JM attacks, entanglement measurement attacks and external attacks.作者: Dawdle 時間: 2025-3-24 08:19
The Attack Case of ECDSA on Blockchain Based on Improved Simple Power Analysised attack method with a power trace. Then the countermeasure of equivalent power consumption at atomic level is given by adding empty operations in point doubling and addition operations for hardware devices of blockchain.作者: 先行 時間: 2025-3-24 14:34
Research on SQL Injection and Defense Technologythe most common and most dangerous attacks. This paper introduces the concept and technical principle of SQL injection attack, introduces the type of SQL injection, analyzes the basic implementation process of SQL injection attack, and finally gives the defense method of preventing SQL injection and summarizes some researches on SQL injection.作者: 誘使 時間: 2025-3-24 18:34
https://doi.org/10.1007/1-56898-635-1we build models to compare the attack surface of the traditional static defense model and MTD one. It is concluded that with certain conditions, the dynamic defense model has a smaller attack surface, which indicate stronger defense ability.作者: 雕鏤 時間: 2025-3-24 20:40
Sonja-Lara Bepperling,Andreas Sch?bel scheme, but also has a fixed length of aggregate signature. The user does not need to exchange a large amount of information when performing single signature, so that users can dynamically join the aggregate signature.作者: 脆弱吧 時間: 2025-3-25 01:34 作者: fiscal 時間: 2025-3-25 06:42 作者: Postmenopause 時間: 2025-3-25 07:34
https://doi.org/10.1007/978-3-322-84319-7consensus algorithm for DNS, which has the advantages of fast consensus and low traffic. Experiments show that the parsing and authentication efficiency of BlockZone is 37.8% higher than that of DNSSEC, and the improved consensus algorithm is improved by 4 orders of magnitude in efficiency than PoW-based consensus algorithm.作者: 模范 時間: 2025-3-25 14:43 作者: Ingratiate 時間: 2025-3-25 17:13 作者: 大罵 時間: 2025-3-25 22:06 作者: Semblance 時間: 2025-3-26 03:38 作者: 武器 時間: 2025-3-26 05:23 作者: Bricklayer 時間: 2025-3-26 11:30
BlockZone: A Blockchain-Based DNS Storage and Retrieval Schemeconsensus algorithm for DNS, which has the advantages of fast consensus and low traffic. Experiments show that the parsing and authentication efficiency of BlockZone is 37.8% higher than that of DNSSEC, and the improved consensus algorithm is improved by 4 orders of magnitude in efficiency than PoW-based consensus algorithm.作者: Meager 時間: 2025-3-26 14:12
Robust Analysis of Grid System Based on Complex Network Attack Modetion verification. Based on the results, the connectivity of the system presents different results in different attack modes. Among them, the random attack has the least impact on the system, while the median attack is the most serious. This also corresponds to the definition of the mediator.作者: kindred 時間: 2025-3-26 19:13 作者: 被告 時間: 2025-3-26 22:46 作者: integrated 時間: 2025-3-27 04:56 作者: pessimism 時間: 2025-3-27 07:49 作者: 使苦惱 時間: 2025-3-27 13:03
Design and Security Analysis of Certificateless Aggregate Signature Schemet satisfy the claimed unforgeability, others are secure, but the calculation and communication cost are large. Based on the comprehensive consideration of security and efficiency, this paper designs a new certificateless aggregate signature scheme without bilinear pairing, proves the security of the作者: 懶鬼才會衰弱 時間: 2025-3-27 17:33 作者: Chronic 時間: 2025-3-27 21:03 作者: neurologist 時間: 2025-3-27 23:16
NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behes are becoming more and more high-speed, diversified and complex. Also, network attacks and infrequent events have emerged, making the promotion of network anomaly detection more and more significant. In order to control and manage the networks and establish a credible network environment, it is cr作者: Sleep-Paralysis 時間: 2025-3-28 03:49
Short Text Topic Recognition and Optimization Method for University Online Communitytrong and clear target groups. Compared with Weibo and post-bar, university community’s text topic recognition needs to solve the problems of large text noise, fast text update and short single text content. To this end, this paper proposes a method of building university topic model based on LDA to作者: arboretum 時間: 2025-3-28 08:35 作者: GONG 時間: 2025-3-28 12:09 作者: 糾纏,纏繞 時間: 2025-3-28 15:58 作者: 經(jīng)典 時間: 2025-3-28 19:07
The Attack Case of ECDSA on Blockchain Based on Improved Simple Power Analysisimmutability. Security of blockchain rely on cryptographic algorithms. However, cryptographic primitives typically get broken or weakened due to increase computational power and advanced cryptanalysis of the side channel methods. The cryptographic algorithms of blockchain will face side channel atta作者: 光明正大 時間: 2025-3-28 23:36
A Weight-Based Channel Estimation Implementation Algorithmpaper, a baseband communication system based on IEEE802.11p is established, and several channel estimation algorithms are evaluated in the simulation environment. Based on the training sequence and data pilot in the IEEE802.11p frame structure, the two are combined and a weight-based channel estimat作者: exacerbate 時間: 2025-3-29 06:28
Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function is not always better than the classical one. This paper investigates the quantum communication complexity based on a multi-party computation model of the composite Boolean-valued function. On this model we design a quantum distributed algorithm to obtain the upper bound of quantum communication com作者: addict 時間: 2025-3-29 11:04 作者: Cabg318 時間: 2025-3-29 13:57 作者: 使隔離 時間: 2025-3-29 18:10
A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHEproperties, such as scalability, into the proposed protocol, a dynamic topology is utilized to structure the very-basic framework. To address the problem of dynamic changes with respect to floating nodes, linear secret sharing scheme is applied to multi-key fully homomorphic encryption with threshol作者: Laconic 時間: 2025-3-29 23:36 作者: 背叛者 時間: 2025-3-30 00:15
Quantum Network Coding Based on Entanglement Distributionme based on entanglement distribution. This scheme can successfully achieve quantum entanglement distribution in the butterfly network. It is efficient in the use of quantum resources and has stronger resistance to environmental noise and other disturbances. We also point out that quantum discord, a作者: 合群 時間: 2025-3-30 05:41
SuperEye: A Distributed Port Scanning Systemtore the returning results for analysis and statistics and at last show the visual results to users. The system interacts with users by friendly web pages. And heartbeat detection is also implemented to ensure the reliability of scanning tasks. Finally, a series of unit tests and integration tests a作者: moratorium 時間: 2025-3-30 09:59 作者: Recess 時間: 2025-3-30 13:02
Short Text Topic Recognition and Optimization Method for University Online Communitydata show that the topic model of university popular events established by the topic recognition model of this paper can reflect some popular events in colleges and universities, so as to provide reasonable support for university management.作者: Immobilize 時間: 2025-3-30 17:13 作者: 檢查 時間: 2025-3-30 21:31
,FOBA: It’s Not What It Looks Like,me based on entanglement distribution. This scheme can successfully achieve quantum entanglement distribution in the butterfly network. It is efficient in the use of quantum resources and has stronger resistance to environmental noise and other disturbances. We also point out that quantum discord, a作者: 說不出 時間: 2025-3-31 04:48
Towards Open Modular Critical Systems ★tore the returning results for analysis and statistics and at last show the visual results to users. The system interacts with users by friendly web pages. And heartbeat detection is also implemented to ensure the reliability of scanning tasks. Finally, a series of unit tests and integration tests a作者: 周年紀(jì)念日 時間: 2025-3-31 07:11
Towards Open Modular Critical Systems ★flow activities. And we also could build a series of NCGs to describe the evolution process of network operation. During these NCGs, we have conducted dynamic analysis to find out the outlier points of graph metric features by using Z-score analysis method so that we can detect the hidden abnormal e作者: anchor 時間: 2025-3-31 11:17
Model Checking Interlocking Control Tablesdata show that the topic model of university popular events established by the topic recognition model of this paper can reflect some popular events in colleges and universities, so as to provide reasonable support for university management.作者: comely 時間: 2025-3-31 16:51
FORTH als Interpreter und Compiler,h point. Finally, under the current development trend of big data processing technology and artificial intelligence technology, the application realization and development trend of network situational awareness are analyzed and forecasted.作者: left-ventricle 時間: 2025-3-31 20:54 作者: SPASM 時間: 2025-3-31 23:52 作者: 供過于求 時間: 2025-4-1 05:30
,FOBA: It’s Not What It Looks Like,unication networks, it receives wide attention. As an important quantum communication resource, quantum entanglement plays a key role in the field of quantum communication and quantum computation, of course, including QNC. Several typical QNC schemes require quantum entanglement to achieve lossless