派博傳思國際中心

標題: Titlebook: Big Data and Security; Second International Yuan Tian,Tinghuai Ma,Muhammad Khurram Khan Conference proceedings 2021 Springer Nature Singapo [打印本頁]

作者: 搖尾乞憐    時間: 2025-3-21 19:02
書目名稱Big Data and Security影響因子(影響力)




書目名稱Big Data and Security影響因子(影響力)學科排名




書目名稱Big Data and Security網(wǎng)絡(luò)公開度




書目名稱Big Data and Security網(wǎng)絡(luò)公開度學科排名




書目名稱Big Data and Security被引頻次




書目名稱Big Data and Security被引頻次學科排名




書目名稱Big Data and Security年度引用




書目名稱Big Data and Security年度引用學科排名




書目名稱Big Data and Security讀者反饋




書目名稱Big Data and Security讀者反饋學科排名





作者: 食品室    時間: 2025-3-21 21:40

作者: 釘牢    時間: 2025-3-22 01:14

作者: Indebted    時間: 2025-3-22 05:34

作者: 財政    時間: 2025-3-22 10:58
Android Malware Detection Method Based on App-Image Conversionree parts: data set construction, app-image conversion, and deep learning detection. In the experiments, the parameters of CNN are determined through comparative analysis. It achieves the detection accuracy of 95.23%, which shows the effectiveness and feasibility of the proposed method.
作者: 不可救藥    時間: 2025-3-22 15:18

作者: Ceremony    時間: 2025-3-22 17:05
1865-0929 included in this book are organized according to the topical sections on cybersecurity and privacy, big data, blockchain and internet of things, and artificial intelligence/ machine learning security..978-981-16-3149-8978-981-16-3150-4Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 欄桿    時間: 2025-3-22 23:34
https://doi.org/10.1007/978-3-031-28659-9hat it can realize terminal access authentication of typical power Internet of things systems such as distribution automation. This scheme improves the data transfer performance of power communication network and solves the bottleneck problem of network performance of power service information communication support platform.
作者: APEX    時間: 2025-3-23 02:59

作者: 不可接觸    時間: 2025-3-23 07:25
V. B. John M.Sc., C. Eng., M.I.M., M.I.M.M.ovement. The analysis of Volte research in power wireless private network supports the application of power wireless private network in the future, provides technical support, and lays a solid foundation for the popularization and application of power wireless private network, and the security of the power network is guaranteed.
作者: FAR    時間: 2025-3-23 12:52
Vernon John Bsc, MSc, CEng, MIM, MIMMis article also implements detailed approaches for data security by verifying parameters and codes, access control, preventing illegal users and using oracle parameters and stored procedures for database security technology. In addition, an empirical study was conducted to assess effectiveness and usefulness.
作者: 繁重    時間: 2025-3-23 14:26

作者: 使饑餓    時間: 2025-3-23 19:04
Introduction to Engineering Research,ed on the substation and integrates data center, charging station and photovoltaic power station. The particle swarm optimization (PSO) in the artificial intelligence algorithm was used to solve the model and determine the optimal site. Finally, a case was used to verify the correctness and effectiveness of the proposed model and method.
作者: IST    時間: 2025-3-24 00:55

作者: headway    時間: 2025-3-24 04:46
1865-0929 e, Singapore, in December 2020..The 44 revised full papers and 8 short papers were carefully reviewed and selected out of 153 submissions. The papers included in this book are organized according to the topical sections on cybersecurity and privacy, big data, blockchain and internet of things, and a
作者: 充滿人    時間: 2025-3-24 10:08
Introduction to Engineering Materialsat IMS AKA mechanism can deal with attack, and solves DoS attack and SPIT attack which can not be solved. In addition, the optimized computational performance is enhanced, the cost is reduced and the authentication time is reduced.
作者: 顯赫的人    時間: 2025-3-24 11:56
DOE and Regression Case Studiesnd the linear matrix inequality techniques, the mean square stable criteria and . controller has been got for the controlled system with suitable event-driven matrix. A numerical example is given to illustrate the feasibility of the control approach in the paper.
作者: cunning    時間: 2025-3-24 18:47

作者: 桶去微染    時間: 2025-3-24 20:14

作者: Agronomy    時間: 2025-3-25 02:06

作者: neutrophils    時間: 2025-3-25 04:17

作者: Intersect    時間: 2025-3-25 11:29

作者: intuition    時間: 2025-3-25 12:31

作者: BOOST    時間: 2025-3-25 19:38

作者: 思想流動    時間: 2025-3-25 22:15
DOE and Regression Case Studiesng window as well as relation and sensitive matrix, which can make anonymous streaming data effectively defense background knowledge attack and homogeneity attack while solving sensitive attribute diversity. Experimental results indicate that RSLK-anonymity algorithm is practical, effective and highly efficient.
作者: 強壯    時間: 2025-3-26 03:15

作者: faultfinder    時間: 2025-3-26 07:47
Quick Response Code Based on Least Significant BitR code is merged with the least significant bit of the picture. It is shown that cannot be recognized by the naked eye. This method can ensure the safety and security of the information during the transmission process. Accuracy, and greatly improve the visual aesthetics of the QR code.
作者: Sedative    時間: 2025-3-26 10:35

作者: Volatile-Oils    時間: 2025-3-26 14:28

作者: MELON    時間: 2025-3-26 18:57
Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithmng window as well as relation and sensitive matrix, which can make anonymous streaming data effectively defense background knowledge attack and homogeneity attack while solving sensitive attribute diversity. Experimental results indicate that RSLK-anonymity algorithm is practical, effective and highly efficient.
作者: HALL    時間: 2025-3-27 00:18
Advanced Regression and Alternativeshan the entire data stream to be fed into local differential privacy (LDP). After the statistical data has been anonymized, we reconstruct the original points using nonlinear techniques. The results from this approach provide significant accuracy when compared with the straightforward anonymization approach.
作者: botany    時間: 2025-3-27 04:44
Privacy Preserving Data Sharing in Online Social Networkshan the entire data stream to be fed into local differential privacy (LDP). After the statistical data has been anonymized, we reconstruct the original points using nonlinear techniques. The results from this approach provide significant accuracy when compared with the straightforward anonymization approach.
作者: outskirts    時間: 2025-3-27 05:56
Application and Research of Power Communication Trusted Access Gatewayhat it can realize terminal access authentication of typical power Internet of things systems such as distribution automation. This scheme improves the data transfer performance of power communication network and solves the bottleneck problem of network performance of power service information communication support platform.
作者: agglomerate    時間: 2025-3-27 11:03

作者: 友好    時間: 2025-3-27 13:41
Research on Application Technology and Security of VoLTE in Power Wireless Private Networkovement. The analysis of Volte research in power wireless private network supports the application of power wireless private network in the future, provides technical support, and lays a solid foundation for the popularization and application of power wireless private network, and the security of the power network is guaranteed.
作者: 彩色的蠟筆    時間: 2025-3-27 19:41

作者: Slit-Lamp    時間: 2025-3-28 01:44
Research on Network Optimization and Network Security in Power Wireless Private Networkesearch of technologies in power system, analyzes the requirements of network in detail, and the coverage and capacity planning of network. As an important infrastructure to support the development of power system, the network will greatly promote the development of energy Internet strategy, and will greatly promote and upgrade the power services.
作者: 護身符    時間: 2025-3-28 04:05
Research on Location Planning of Multi-station Integration Based on Particle Swarm Optimizationed on the substation and integrates data center, charging station and photovoltaic power station. The particle swarm optimization (PSO) in the artificial intelligence algorithm was used to solve the model and determine the optimal site. Finally, a case was used to verify the correctness and effectiveness of the proposed model and method.
作者: 機警    時間: 2025-3-28 09:43
Research on Experimental Verification Scheme of 5G in Power System wireless communication are tested. The test scheme includes the laboratory test and the outfield test, and the test scheme is given. The test scheme verifies the supporting ability of 5G technology in power system, and lays a foundation for the application of 5G technology in power system.
作者: START    時間: 2025-3-28 11:45

作者: 蛙鳴聲    時間: 2025-3-28 17:47
The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modificationty of all SQL queries. While the fine-grained access control (FGAC) method in the DBMS shall meet the sanity attribute requirements. It means that the answer to the query obtained by this method under the FGAC shall conform to the answer without the FGAC. In this article, a new query modification al
作者: Homocystinuria    時間: 2025-3-28 19:49

作者: Daily-Value    時間: 2025-3-29 01:38

作者: 漂白    時間: 2025-3-29 04:46
Fault Inspection of Brake Shoe Wear for TEDS Based on Machine VisionAs similar as TFDS in moving freight trains, TEDS is also applying in fault detection of the running EMU. Brake shoe is one of the key components in brake system, and the pre-warning on wear limitation about it is very important in the fault detection on EMU. In this paper, we propose a real-time, a
作者: LUDE    時間: 2025-3-29 08:04

作者: Stress    時間: 2025-3-29 12:28

作者: 主動    時間: 2025-3-29 16:41

作者: 蒼白    時間: 2025-3-29 21:49

作者: forthy    時間: 2025-3-30 00:07

作者: arousal    時間: 2025-3-30 05:41
Quick Response Code Based on Least Significant Bitrmation into the QR code first, and embed the QR code into the lowest bit of the pixels in the background image for hiding the information. If the picture information is necessary to read by obtaining the QR code picture, the lowest bit of the picture pixel is extracted through the program language,
作者: 針葉    時間: 2025-3-30 11:00
Event-Based , Control for Networked Control System with Saturation Constraintsechanism and saturation constraints concurrently, the networked control system is modeled as a nonlinear system. By using Lyapunov-functional method and the linear matrix inequality techniques, the mean square stable criteria and . controller has been got for the controlled system with suitable even
作者: PAEAN    時間: 2025-3-30 12:45
Privacy Preserving Data Sharing in Online Social Networks for intensive concern about information and privacy protection. Moreover, the users’ statistical usage data collected for analysis is also subject to leakage and therefor require protection. Although there is an availability of privacy preserving methods, they are not scalable, or tend to underperf
作者: 大雨    時間: 2025-3-30 20:10

作者: 轉(zhuǎn)換    時間: 2025-3-31 00:47

作者: 相信    時間: 2025-3-31 04:29
Research on Experimental Verification Scheme of 5G in Power Systemd puts forward a higher requirement for the communication technology. The development requirements of State Grid Corporation are also highly in line with the scenario of 5G application. In response to this situation, the network performance, application mode, network scheme and security policy of 5G
作者: crescendo    時間: 2025-3-31 08:12

作者: single    時間: 2025-3-31 12:00
Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithmntroduce k-anonymity when data publishing. In this paper, how to employ k-anonymity in stream data sets is studied, and the relationship and the sensitivity matrix of the basic knowledge about Quasi identifier (QI) and sensitive attributes are established. RSLK-anonymity algorithm is proposed for so
作者: extract    時間: 2025-3-31 15:22
Conference proceedings 2021re, in December 2020..The 44 revised full papers and 8 short papers were carefully reviewed and selected out of 153 submissions. The papers included in this book are organized according to the topical sections on cybersecurity and privacy, big data, blockchain and internet of things, and artificial intelligence/ machine learning security..
作者: 冷漠    時間: 2025-3-31 21:15

作者: Statins    時間: 2025-3-31 23:37

作者: Anhydrous    時間: 2025-4-1 03:32

作者: 國家明智    時間: 2025-4-1 09:24
https://doi.org/10.1007/978-3-031-28659-9 to the authentication center. In view of this situation, block chain technology is introduced and applied to all kinds of power service access application scenarios through research and development. A block-chain-based power universal service access gateway is developed and tested. The test shows t
作者: brassy    時間: 2025-4-1 11:22
V. B. John M.Sc., C. Eng., M.I.M., M.I.M.M.ty of all SQL queries. While the fine-grained access control (FGAC) method in the DBMS shall meet the sanity attribute requirements. It means that the answer to the query obtained by this method under the FGAC shall conform to the answer without the FGAC. In this article, a new query modification al




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平泉县| 青冈县| 新巴尔虎右旗| 沈丘县| 万年县| 长沙县| 宁陵县| 诏安县| 潼关县| 小金县| 汉沽区| 图片| 济阳县| 安岳县| 信宜市| 重庆市| 隆德县| 望奎县| 兰坪| 元氏县| 韩城市| 马山县| 和平县| 石楼县| 博湖县| 洛南县| 宁强县| 洱源县| 阿克苏市| 盐津县| 伊吾县| 浙江省| 云和县| 宣化县| 太保市| 南康市| 偏关县| 盈江县| 基隆市| 延川县| 苗栗市|