標(biāo)題: Titlebook: Big Data and Security; First International Yuan Tian,Tinghuai Ma,Muhammad Khurram Khan Conference proceedings 2020 Springer Nature Singapo [打印本頁] 作者: GALL 時間: 2025-3-21 19:57
書目名稱Big Data and Security影響因子(影響力)
書目名稱Big Data and Security影響因子(影響力)學(xué)科排名
書目名稱Big Data and Security網(wǎng)絡(luò)公開度
書目名稱Big Data and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Big Data and Security被引頻次
書目名稱Big Data and Security被引頻次學(xué)科排名
書目名稱Big Data and Security年度引用
書目名稱Big Data and Security年度引用學(xué)科排名
書目名稱Big Data and Security讀者反饋
書目名稱Big Data and Security讀者反饋學(xué)科排名
作者: 廣大 時間: 2025-3-21 21:23 作者: 自負(fù)的人 時間: 2025-3-22 02:31
Security, Safety and Privacy Issues of Unmanned Aerial Vehicle Systemsplications ranging from military and security to surveillance, entertainment, business, and media. In most of these applications, UAVs were employed to tackle critical operations. Most of operations require more reliable solutions in order to ensure operating UAVs safely. Unfortunately, UAV systems 作者: LIMN 時間: 2025-3-22 08:35
A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commercetion and prediction of users’ trustworthiness is also of great importance for social commerce marketing and promotion. However, analysis of trust and detection of what factors influence trust between users need investigation. This paper proposes a trust model and divides trust into direct trust and 作者: 形上升才刺激 時間: 2025-3-22 10:46 作者: Myocarditis 時間: 2025-3-22 13:59 作者: Hyaluronic-Acid 時間: 2025-3-22 19:40
Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks Low-rate dos (Ldos) attacks can exhaust the target switch’s flow table resource with a very low attack rate, which degrades the network performance seriously. In order to detect the flow table overflow Ldos attacks in the SDN environment, we analyzed the two typical flow table overflow Ldos attack 作者: 群居動物 時間: 2025-3-23 01:16
Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprisesnsitive and confidential big financial data, namely, financial reports of use to shareholders, stakeholders, competitors and public users. However, still, many companies have not, yet, successfully adopted XBRL despite its foreseen competitive advantages. Different factors affect the successful adop作者: 有常識 時間: 2025-3-23 03:58 作者: cognizant 時間: 2025-3-23 07:04
Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structureccess policy. Most existing CP-ABE schemes suffer from the issue of having long ciphertext size. The ciphertext depends on the number of attributes in the access policy. Also, Most CP-ABE does not consider the recipients’ anonymity, the encryptor-specified access structure is not hidden in the ciphe作者: TEM 時間: 2025-3-23 11:33 作者: 津貼 時間: 2025-3-23 16:48
Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph network resources, needing large storage resources and computing resources. Based on IBC identification cryptograph, this paper proposes a lightweight identity authentication scheme which uses SAKI private key distribution protocol and SM9 national secret algorithm. The scheme mainly includes three作者: 銼屑 時間: 2025-3-23 20:47 作者: 不規(guī)則的跳動 時間: 2025-3-24 01:21 作者: 賄賂 時間: 2025-3-24 02:50 作者: SLAY 時間: 2025-3-24 09:35 作者: restrain 時間: 2025-3-24 13:45
Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerice and reconnaissance, while popular evaluation measures are sometimes not applicable for specific tasks. In order to evaluate visual object detection and tracking algorithms of low-altitude aerial video properly, we first summarize the evaluation basis of computer vision tasks, including ground tru作者: 金桌活畫面 時間: 2025-3-24 15:41 作者: GULP 時間: 2025-3-24 19:13
1865-0929 China, in December 2019.. .The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artifi作者: 裂縫 時間: 2025-3-25 00:30 作者: Conducive 時間: 2025-3-25 05:26
Introduction to Empirical Processestion, production, operation & maintenance, disposal), and level of integration between the twin and the physical system (model, shadow, twin). As this research-in-progress addresses examples of research questions in light of the framework, further research to build a full-scale research agenda based on a systematic literature review is suggested.作者: enlist 時間: 2025-3-25 11:31 作者: 食品室 時間: 2025-3-25 11:53
https://doi.org/10.1007/978-3-030-27382-8ghtweight authentication makes the node trusted. Authenticating with?speed?and direction make the nodes belong to the same train. And ultimately vehicle network is established. Through the vehicle network,?vehicle?sensors collect?data in real time?and transmit to the ground processing?system. Finally, ensure the safety of railway freight train.作者: connoisseur 時間: 2025-3-25 19:48 作者: 玩笑 時間: 2025-3-25 21:20 作者: 壓倒 時間: 2025-3-26 03:50
A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social Commercee used to find influential nodes. We found similarity and prestige is relatively more important than familiarity and ability trust in users’ connections. Besides, there is a strong linear relationship between user nodes’ trust and their centrality.作者: Schlemms-Canal 時間: 2025-3-26 04:43 作者: 頂點(diǎn) 時間: 2025-3-26 09:26
Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprisesysis, the impact of human factors on XBRL successful adoption is defined. Results identified the impact of human factors impact on the successful adoption of XBRL by firms seeking to adopt the lateral mandatory financial reporting standards.作者: Nausea 時間: 2025-3-26 13:48
A Security Vehicle Network Organization Method for Railway Freight Train Based on Lightweight Authenghtweight authentication makes the node trusted. Authenticating with?speed?and direction make the nodes belong to the same train. And ultimately vehicle network is established. Through the vehicle network,?vehicle?sensors collect?data in real time?and transmit to the ground processing?system. Finally, ensure the safety of railway freight train.作者: CALL 時間: 2025-3-26 18:41
Lightweight Identity Authentication Scheme Based on IBC Identity Cryptographproposed in this paper greatly saves network resources, and has higher security performance, shorter length key and more convenient key management. It can be combined with device identification in the Internet of Things to solve key security problems such as identity authentication, link encryption and data protection in the Internet of Things.作者: cathartic 時間: 2025-3-26 21:47 作者: ligature 時間: 2025-3-27 02:40 作者: 嫻熟 時間: 2025-3-27 05:52 作者: 失望昨天 時間: 2025-3-27 11:29 作者: photophobia 時間: 2025-3-27 16:02
Semiparametric Models and Efficiencyis adopted variance-based structural equation modelling technique. The results of the study indicate that nepotism significantly impacts the human resources component of ERP systems implementation success. Such systems can be more effectively implemented in firms with an organizational culture that does not nurture nepotism.作者: 不足的東西 時間: 2025-3-27 21:25 作者: 領(lǐng)帶 時間: 2025-3-27 22:15 作者: 陰險 時間: 2025-3-28 04:20
Digital Image Processing Fundamentals, forward secrecy. We then proposed an improved dynamic certificateless AAGKA protocol. Security proofs show that our protocol can provide security attributes including secrecy, known-key security, key compromise impersonation resistance, forward security, non-repudiation, and privacy. Furthermore, the proposed protocol is still efficient.作者: 贊美者 時間: 2025-3-28 08:01
Step 4: Brainstorm Solution Options,ental results show that the proposed encryption method achieves an ideal encryption effect for medical images. Under the condition that the encrypted image is compressed to 1/4 of the original image, the decryption can still be completed effectively.作者: Epidural-Space 時間: 2025-3-28 10:49
Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined Networks the flow size and position analysis method. Besides, we also implemented the traffic characteristics data acquisition and flow table overflow prediction algorithm. The experimental results show that SAIA can effectively detect the table overflow low-rate dos attacks and mitigate their impact on network performance.作者: 因無茶而冷淡 時間: 2025-3-28 17:18
Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanonis adopted variance-based structural equation modelling technique. The results of the study indicate that nepotism significantly impacts the human resources component of ERP systems implementation success. Such systems can be more effectively implemented in firms with an organizational culture that does not nurture nepotism.作者: 課程 時間: 2025-3-28 19:42
Security Analysis and Improvement on Kerberos Authentication Protocolf to eliminate the hidden trouble caused by using plaintext when Kerberos-clients first interact with AS. Then we apply Kerberos in the SSL handshake protocol in order to test the performance of improved Kerberos. The experimental results show that the scheme effectively improves the authentication performance of Kerberos.作者: ORE 時間: 2025-3-28 23:55 作者: 無瑕疵 時間: 2025-3-29 04:12
An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trust forward secrecy. We then proposed an improved dynamic certificateless AAGKA protocol. Security proofs show that our protocol can provide security attributes including secrecy, known-key security, key compromise impersonation resistance, forward security, non-repudiation, and privacy. Furthermore, the proposed protocol is still efficient.作者: 會犯錯誤 時間: 2025-3-29 11:14 作者: 壓碎 時間: 2025-3-29 12:25 作者: harmony 時間: 2025-3-29 18:23
Semiparametric Models and Efficiencyed by the existing lattice-based IBE schemes from LWE. Its storage cost is also lower. We show that our IBE scheme is semantically secure against an adaptive chosen plaintext attack (CPA) from all probabilistic polynomial time adversaries in the random oracle model.作者: 沖突 時間: 2025-3-29 21:43 作者: 寒冷 時間: 2025-3-30 03:34 作者: Dedication 時間: 2025-3-30 04:14
https://doi.org/10.1007/978-981-15-7530-3artificial intelligence; communication systems; computer hardware; computer networks; computer security; 作者: BUCK 時間: 2025-3-30 10:16
978-981-15-7529-7Springer Nature Singapore Pte Ltd. 2020作者: Humble 時間: 2025-3-30 15:26
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/185683.jpg作者: Connotation 時間: 2025-3-30 18:21
Semiparametric Models and Efficiencyy (CPK) technology can be used to enhance the efficiency of IBE schemes. In this paper, we use CPK to construct a more efficient lattice-based IBE scheme based on a variant of learning with errors (LWE) problem, by avoiding complex trapdoor generation algorithm and preimage sampling algorithm requir作者: chlorosis 時間: 2025-3-30 20:43 作者: Nebulizer 時間: 2025-3-31 02:22 作者: Gastric 時間: 2025-3-31 08:37
Overview of Semiparametric Inferencetion and prediction of users’ trustworthiness is also of great importance for social commerce marketing and promotion. However, analysis of trust and detection of what factors influence trust between users need investigation. This paper proposes a trust model and divides trust into direct trust and