派博傳思國際中心

標(biāo)題: Titlebook: Big Data and Security; First International Yuan Tian,Tinghuai Ma,Muhammad Khurram Khan Conference proceedings 2020 Springer Nature Singapo [打印本頁]

作者: GALL    時間: 2025-3-21 19:57
書目名稱Big Data and Security影響因子(影響力)




書目名稱Big Data and Security影響因子(影響力)學(xué)科排名




書目名稱Big Data and Security網(wǎng)絡(luò)公開度




書目名稱Big Data and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Big Data and Security被引頻次




書目名稱Big Data and Security被引頻次學(xué)科排名




書目名稱Big Data and Security年度引用




書目名稱Big Data and Security年度引用學(xué)科排名




書目名稱Big Data and Security讀者反饋




書目名稱Big Data and Security讀者反饋學(xué)科排名





作者: 廣大    時間: 2025-3-21 21:23

作者: 自負(fù)的人    時間: 2025-3-22 02:31
Security, Safety and Privacy Issues of Unmanned Aerial Vehicle Systemsplications ranging from military and security to surveillance, entertainment, business, and media. In most of these applications, UAVs were employed to tackle critical operations. Most of operations require more reliable solutions in order to ensure operating UAVs safely. Unfortunately, UAV systems
作者: LIMN    時間: 2025-3-22 08:35
A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commercetion and prediction of users’ trustworthiness is also of great importance for social commerce marketing and promotion. However, analysis of trust and detection of what factors influence trust between users need investigation. This paper proposes a trust model and divides trust into direct trust and
作者: 形上升才刺激    時間: 2025-3-22 10:46

作者: Myocarditis    時間: 2025-3-22 13:59

作者: Hyaluronic-Acid    時間: 2025-3-22 19:40
Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks Low-rate dos (Ldos) attacks can exhaust the target switch’s flow table resource with a very low attack rate, which degrades the network performance seriously. In order to detect the flow table overflow Ldos attacks in the SDN environment, we analyzed the two typical flow table overflow Ldos attack
作者: 群居動物    時間: 2025-3-23 01:16
Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprisesnsitive and confidential big financial data, namely, financial reports of use to shareholders, stakeholders, competitors and public users. However, still, many companies have not, yet, successfully adopted XBRL despite its foreseen competitive advantages. Different factors affect the successful adop
作者: 有常識    時間: 2025-3-23 03:58

作者: cognizant    時間: 2025-3-23 07:04
Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structureccess policy. Most existing CP-ABE schemes suffer from the issue of having long ciphertext size. The ciphertext depends on the number of attributes in the access policy. Also, Most CP-ABE does not consider the recipients’ anonymity, the encryptor-specified access structure is not hidden in the ciphe
作者: TEM    時間: 2025-3-23 11:33

作者: 津貼    時間: 2025-3-23 16:48
Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph network resources, needing large storage resources and computing resources. Based on IBC identification cryptograph, this paper proposes a lightweight identity authentication scheme which uses SAKI private key distribution protocol and SM9 national secret algorithm. The scheme mainly includes three
作者: 銼屑    時間: 2025-3-23 20:47

作者: 不規(guī)則的跳動    時間: 2025-3-24 01:21

作者: 賄賂    時間: 2025-3-24 02:50

作者: SLAY    時間: 2025-3-24 09:35

作者: restrain    時間: 2025-3-24 13:45
Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerice and reconnaissance, while popular evaluation measures are sometimes not applicable for specific tasks. In order to evaluate visual object detection and tracking algorithms of low-altitude aerial video properly, we first summarize the evaluation basis of computer vision tasks, including ground tru
作者: 金桌活畫面    時間: 2025-3-24 15:41

作者: GULP    時間: 2025-3-24 19:13
1865-0929 China, in December 2019.. .The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artifi
作者: 裂縫    時間: 2025-3-25 00:30

作者: Conducive    時間: 2025-3-25 05:26
Introduction to Empirical Processestion, production, operation & maintenance, disposal), and level of integration between the twin and the physical system (model, shadow, twin). As this research-in-progress addresses examples of research questions in light of the framework, further research to build a full-scale research agenda based on a systematic literature review is suggested.
作者: enlist    時間: 2025-3-25 11:31

作者: 食品室    時間: 2025-3-25 11:53
https://doi.org/10.1007/978-3-030-27382-8ghtweight authentication makes the node trusted. Authenticating with?speed?and direction make the nodes belong to the same train. And ultimately vehicle network is established. Through the vehicle network,?vehicle?sensors collect?data in real time?and transmit to the ground processing?system. Finally, ensure the safety of railway freight train.
作者: connoisseur    時間: 2025-3-25 19:48

作者: 玩笑    時間: 2025-3-25 21:20

作者: 壓倒    時間: 2025-3-26 03:50
A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commercee used to find influential nodes. We found similarity and prestige is relatively more important than familiarity and ability trust in users’ connections. Besides, there is a strong linear relationship between user nodes’ trust and their centrality.
作者: Schlemms-Canal    時間: 2025-3-26 04:43

作者: 頂點(diǎn)    時間: 2025-3-26 09:26
Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprisesysis, the impact of human factors on XBRL successful adoption is defined. Results identified the impact of human factors impact on the successful adoption of XBRL by firms seeking to adopt the lateral mandatory financial reporting standards.
作者: Nausea    時間: 2025-3-26 13:48
A Security Vehicle Network Organization Method for Railway Freight Train Based on Lightweight Authenghtweight authentication makes the node trusted. Authenticating with?speed?and direction make the nodes belong to the same train. And ultimately vehicle network is established. Through the vehicle network,?vehicle?sensors collect?data in real time?and transmit to the ground processing?system. Finally, ensure the safety of railway freight train.
作者: CALL    時間: 2025-3-26 18:41
Lightweight Identity Authentication Scheme Based on IBC Identity Cryptographproposed in this paper greatly saves network resources, and has higher security performance, shorter length key and more convenient key management. It can be combined with device identification in the Internet of Things to solve key security problems such as identity authentication, link encryption and data protection in the Internet of Things.
作者: cathartic    時間: 2025-3-26 21:47

作者: ligature    時間: 2025-3-27 02:40

作者: 嫻熟    時間: 2025-3-27 05:52

作者: 失望昨天    時間: 2025-3-27 11:29

作者: photophobia    時間: 2025-3-27 16:02
Semiparametric Models and Efficiencyis adopted variance-based structural equation modelling technique. The results of the study indicate that nepotism significantly impacts the human resources component of ERP systems implementation success. Such systems can be more effectively implemented in firms with an organizational culture that does not nurture nepotism.
作者: 不足的東西    時間: 2025-3-27 21:25

作者: 領(lǐng)帶    時間: 2025-3-27 22:15

作者: 陰險    時間: 2025-3-28 04:20
Digital Image Processing Fundamentals, forward secrecy. We then proposed an improved dynamic certificateless AAGKA protocol. Security proofs show that our protocol can provide security attributes including secrecy, known-key security, key compromise impersonation resistance, forward security, non-repudiation, and privacy. Furthermore, the proposed protocol is still efficient.
作者: 贊美者    時間: 2025-3-28 08:01
Step 4: Brainstorm Solution Options,ental results show that the proposed encryption method achieves an ideal encryption effect for medical images. Under the condition that the encrypted image is compressed to 1/4 of the original image, the decryption can still be completed effectively.
作者: Epidural-Space    時間: 2025-3-28 10:49
Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks the flow size and position analysis method. Besides, we also implemented the traffic characteristics data acquisition and flow table overflow prediction algorithm. The experimental results show that SAIA can effectively detect the table overflow low-rate dos attacks and mitigate their impact on network performance.
作者: 因無茶而冷淡    時間: 2025-3-28 17:18
Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanonis adopted variance-based structural equation modelling technique. The results of the study indicate that nepotism significantly impacts the human resources component of ERP systems implementation success. Such systems can be more effectively implemented in firms with an organizational culture that does not nurture nepotism.
作者: 課程    時間: 2025-3-28 19:42
Security Analysis and Improvement on Kerberos Authentication Protocolf to eliminate the hidden trouble caused by using plaintext when Kerberos-clients first interact with AS. Then we apply Kerberos in the SSL handshake protocol in order to test the performance of improved Kerberos. The experimental results show that the scheme effectively improves the authentication performance of Kerberos.
作者: ORE    時間: 2025-3-28 23:55

作者: 無瑕疵    時間: 2025-3-29 04:12
An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trust forward secrecy. We then proposed an improved dynamic certificateless AAGKA protocol. Security proofs show that our protocol can provide security attributes including secrecy, known-key security, key compromise impersonation resistance, forward security, non-repudiation, and privacy. Furthermore, the proposed protocol is still efficient.
作者: 會犯錯誤    時間: 2025-3-29 11:14

作者: 壓碎    時間: 2025-3-29 12:25

作者: harmony    時間: 2025-3-29 18:23
Semiparametric Models and Efficiencyed by the existing lattice-based IBE schemes from LWE. Its storage cost is also lower. We show that our IBE scheme is semantically secure against an adaptive chosen plaintext attack (CPA) from all probabilistic polynomial time adversaries in the random oracle model.
作者: 沖突    時間: 2025-3-29 21:43

作者: 寒冷    時間: 2025-3-30 03:34

作者: Dedication    時間: 2025-3-30 04:14
https://doi.org/10.1007/978-981-15-7530-3artificial intelligence; communication systems; computer hardware; computer networks; computer security;
作者: BUCK    時間: 2025-3-30 10:16
978-981-15-7529-7Springer Nature Singapore Pte Ltd. 2020
作者: Humble    時間: 2025-3-30 15:26
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/185683.jpg
作者: Connotation    時間: 2025-3-30 18:21
Semiparametric Models and Efficiencyy (CPK) technology can be used to enhance the efficiency of IBE schemes. In this paper, we use CPK to construct a more efficient lattice-based IBE scheme based on a variant of learning with errors (LWE) problem, by avoiding complex trapdoor generation algorithm and preimage sampling algorithm requir
作者: chlorosis    時間: 2025-3-30 20:43

作者: Nebulizer    時間: 2025-3-31 02:22

作者: Gastric    時間: 2025-3-31 08:37
Overview of Semiparametric Inferencetion and prediction of users’ trustworthiness is also of great importance for social commerce marketing and promotion. However, analysis of trust and detection of what factors influence trust between users need investigation. This paper proposes a trust model and divides trust into direct trust and




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
任丘市| 榆社县| 黔东| 泰宁县| 福海县| 绵竹市| 和田县| 祥云县| 当雄县| 伊春市| 长泰县| 托克托县| 西畴县| 鄂温| 临汾市| 达孜县| 榆中县| 正宁县| 宜君县| 阳西县| 黄龙县| 双柏县| 渝北区| 三河市| 永顺县| 静乐县| 紫阳县| 克什克腾旗| 鄂尔多斯市| 上林县| 呼图壁县| 获嘉县| 巴林右旗| 禹城市| 涞源县| 寻乌县| 梓潼县| 双柏县| 彰化县| 濉溪县| 乐至县|