標題: Titlebook: Big Data and Security; Second International Yuan Tian,Tinghuai Ma,Muhammad Khurram Khan Conference proceedings 2021 Springer Nature Singapo [打印本頁] 作者: 搖尾乞憐 時間: 2025-3-21 19:02
書目名稱Big Data and Security影響因子(影響力)
書目名稱Big Data and Security影響因子(影響力)學科排名
書目名稱Big Data and Security網(wǎng)絡(luò)公開度
書目名稱Big Data and Security網(wǎng)絡(luò)公開度學科排名
書目名稱Big Data and Security被引頻次
書目名稱Big Data and Security被引頻次學科排名
書目名稱Big Data and Security年度引用
書目名稱Big Data and Security年度引用學科排名
書目名稱Big Data and Security讀者反饋
書目名稱Big Data and Security讀者反饋學科排名
作者: 食品室 時間: 2025-3-21 21:40 作者: 釘牢 時間: 2025-3-22 01:14 作者: Indebted 時間: 2025-3-22 05:34 作者: 財政 時間: 2025-3-22 10:58
Android Malware Detection Method Based on App-Image Conversionree parts: data set construction, app-image conversion, and deep learning detection. In the experiments, the parameters of CNN are determined through comparative analysis. It achieves the detection accuracy of 95.23%, which shows the effectiveness and feasibility of the proposed method.作者: 不可救藥 時間: 2025-3-22 15:18 作者: Ceremony 時間: 2025-3-22 17:05
1865-0929 included in this book are organized according to the topical sections on cybersecurity and privacy, big data, blockchain and internet of things, and artificial intelligence/ machine learning security..978-981-16-3149-8978-981-16-3150-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 欄桿 時間: 2025-3-22 23:34
https://doi.org/10.1007/978-3-031-28659-9hat it can realize terminal access authentication of typical power Internet of things systems such as distribution automation. This scheme improves the data transfer performance of power communication network and solves the bottleneck problem of network performance of power service information communication support platform.作者: APEX 時間: 2025-3-23 02:59 作者: 不可接觸 時間: 2025-3-23 07:25
V. B. John M.Sc., C. Eng., M.I.M., M.I.M.M.ovement. The analysis of Volte research in power wireless private network supports the application of power wireless private network in the future, provides technical support, and lays a solid foundation for the popularization and application of power wireless private network, and the security of the power network is guaranteed.作者: FAR 時間: 2025-3-23 12:52
Vernon John Bsc, MSc, CEng, MIM, MIMMis article also implements detailed approaches for data security by verifying parameters and codes, access control, preventing illegal users and using oracle parameters and stored procedures for database security technology. In addition, an empirical study was conducted to assess effectiveness and usefulness.作者: 繁重 時間: 2025-3-23 14:26 作者: 使饑餓 時間: 2025-3-23 19:04
Introduction to Engineering Research,ed on the substation and integrates data center, charging station and photovoltaic power station. The particle swarm optimization (PSO) in the artificial intelligence algorithm was used to solve the model and determine the optimal site. Finally, a case was used to verify the correctness and effectiveness of the proposed model and method.作者: IST 時間: 2025-3-24 00:55 作者: headway 時間: 2025-3-24 04:46
1865-0929 e, Singapore, in December 2020..The 44 revised full papers and 8 short papers were carefully reviewed and selected out of 153 submissions. The papers included in this book are organized according to the topical sections on cybersecurity and privacy, big data, blockchain and internet of things, and a作者: 充滿人 時間: 2025-3-24 10:08
Introduction to Engineering Materialsat IMS AKA mechanism can deal with attack, and solves DoS attack and SPIT attack which can not be solved. In addition, the optimized computational performance is enhanced, the cost is reduced and the authentication time is reduced.作者: 顯赫的人 時間: 2025-3-24 11:56
DOE and Regression Case Studiesnd the linear matrix inequality techniques, the mean square stable criteria and . controller has been got for the controlled system with suitable event-driven matrix. A numerical example is given to illustrate the feasibility of the control approach in the paper.作者: cunning 時間: 2025-3-24 18:47 作者: 桶去微染 時間: 2025-3-24 20:14 作者: Agronomy 時間: 2025-3-25 02:06 作者: neutrophils 時間: 2025-3-25 04:17 作者: Intersect 時間: 2025-3-25 11:29 作者: intuition 時間: 2025-3-25 12:31 作者: BOOST 時間: 2025-3-25 19:38 作者: 思想流動 時間: 2025-3-25 22:15
DOE and Regression Case Studiesng window as well as relation and sensitive matrix, which can make anonymous streaming data effectively defense background knowledge attack and homogeneity attack while solving sensitive attribute diversity. Experimental results indicate that RSLK-anonymity algorithm is practical, effective and highly efficient.作者: 強壯 時間: 2025-3-26 03:15 作者: faultfinder 時間: 2025-3-26 07:47
Quick Response Code Based on Least Significant BitR code is merged with the least significant bit of the picture. It is shown that cannot be recognized by the naked eye. This method can ensure the safety and security of the information during the transmission process. Accuracy, and greatly improve the visual aesthetics of the QR code.作者: Sedative 時間: 2025-3-26 10:35 作者: Volatile-Oils 時間: 2025-3-26 14:28 作者: MELON 時間: 2025-3-26 18:57
Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithmng window as well as relation and sensitive matrix, which can make anonymous streaming data effectively defense background knowledge attack and homogeneity attack while solving sensitive attribute diversity. Experimental results indicate that RSLK-anonymity algorithm is practical, effective and highly efficient.作者: HALL 時間: 2025-3-27 00:18
Advanced Regression and Alternativeshan the entire data stream to be fed into local differential privacy (LDP). After the statistical data has been anonymized, we reconstruct the original points using nonlinear techniques. The results from this approach provide significant accuracy when compared with the straightforward anonymization approach.作者: botany 時間: 2025-3-27 04:44
Privacy Preserving Data Sharing in Online Social Networkshan the entire data stream to be fed into local differential privacy (LDP). After the statistical data has been anonymized, we reconstruct the original points using nonlinear techniques. The results from this approach provide significant accuracy when compared with the straightforward anonymization approach.作者: outskirts 時間: 2025-3-27 05:56
Application and Research of Power Communication Trusted Access Gatewayhat it can realize terminal access authentication of typical power Internet of things systems such as distribution automation. This scheme improves the data transfer performance of power communication network and solves the bottleneck problem of network performance of power service information communication support platform.作者: agglomerate 時間: 2025-3-27 11:03 作者: 友好 時間: 2025-3-27 13:41
Research on Application Technology and Security of VoLTE in Power Wireless Private Networkovement. The analysis of Volte research in power wireless private network supports the application of power wireless private network in the future, provides technical support, and lays a solid foundation for the popularization and application of power wireless private network, and the security of the power network is guaranteed.作者: 彩色的蠟筆 時間: 2025-3-27 19:41 作者: Slit-Lamp 時間: 2025-3-28 01:44
Research on Network Optimization and Network Security in Power Wireless Private Networkesearch of technologies in power system, analyzes the requirements of network in detail, and the coverage and capacity planning of network. As an important infrastructure to support the development of power system, the network will greatly promote the development of energy Internet strategy, and will greatly promote and upgrade the power services.作者: 護身符 時間: 2025-3-28 04:05
Research on Location Planning of Multi-station Integration Based on Particle Swarm Optimizationed on the substation and integrates data center, charging station and photovoltaic power station. The particle swarm optimization (PSO) in the artificial intelligence algorithm was used to solve the model and determine the optimal site. Finally, a case was used to verify the correctness and effectiveness of the proposed model and method.作者: 機警 時間: 2025-3-28 09:43
Research on Experimental Verification Scheme of 5G in Power System wireless communication are tested. The test scheme includes the laboratory test and the outfield test, and the test scheme is given. The test scheme verifies the supporting ability of 5G technology in power system, and lays a foundation for the application of 5G technology in power system.作者: START 時間: 2025-3-28 11:45 作者: 蛙鳴聲 時間: 2025-3-28 17:47
The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modificationty of all SQL queries. While the fine-grained access control (FGAC) method in the DBMS shall meet the sanity attribute requirements. It means that the answer to the query obtained by this method under the FGAC shall conform to the answer without the FGAC. In this article, a new query modification al作者: Homocystinuria 時間: 2025-3-28 19:49 作者: Daily-Value 時間: 2025-3-29 01:38 作者: 漂白 時間: 2025-3-29 04:46
Fault Inspection of Brake Shoe Wear for TEDS Based on Machine VisionAs similar as TFDS in moving freight trains, TEDS is also applying in fault detection of the running EMU. Brake shoe is one of the key components in brake system, and the pre-warning on wear limitation about it is very important in the fault detection on EMU. In this paper, we propose a real-time, a作者: LUDE 時間: 2025-3-29 08:04 作者: Stress 時間: 2025-3-29 12:28 作者: 主動 時間: 2025-3-29 16:41 作者: 蒼白 時間: 2025-3-29 21:49 作者: forthy 時間: 2025-3-30 00:07 作者: arousal 時間: 2025-3-30 05:41
Quick Response Code Based on Least Significant Bitrmation into the QR code first, and embed the QR code into the lowest bit of the pixels in the background image for hiding the information. If the picture information is necessary to read by obtaining the QR code picture, the lowest bit of the picture pixel is extracted through the program language,作者: 針葉 時間: 2025-3-30 11:00
Event-Based , Control for Networked Control System with Saturation Constraintsechanism and saturation constraints concurrently, the networked control system is modeled as a nonlinear system. By using Lyapunov-functional method and the linear matrix inequality techniques, the mean square stable criteria and . controller has been got for the controlled system with suitable even作者: PAEAN 時間: 2025-3-30 12:45
Privacy Preserving Data Sharing in Online Social Networks for intensive concern about information and privacy protection. Moreover, the users’ statistical usage data collected for analysis is also subject to leakage and therefor require protection. Although there is an availability of privacy preserving methods, they are not scalable, or tend to underperf作者: 大雨 時間: 2025-3-30 20:10 作者: 轉(zhuǎn)換 時間: 2025-3-31 00:47 作者: 相信 時間: 2025-3-31 04:29
Research on Experimental Verification Scheme of 5G in Power Systemd puts forward a higher requirement for the communication technology. The development requirements of State Grid Corporation are also highly in line with the scenario of 5G application. In response to this situation, the network performance, application mode, network scheme and security policy of 5G作者: crescendo 時間: 2025-3-31 08:12 作者: single 時間: 2025-3-31 12:00
Incremental Anonymous Privacy-Protecting Data Mining Method Based on Feature Correlation Algorithmntroduce k-anonymity when data publishing. In this paper, how to employ k-anonymity in stream data sets is studied, and the relationship and the sensitivity matrix of the basic knowledge about Quasi identifier (QI) and sensitive attributes are established. RSLK-anonymity algorithm is proposed for so作者: extract 時間: 2025-3-31 15:22
Conference proceedings 2021re, in December 2020..The 44 revised full papers and 8 short papers were carefully reviewed and selected out of 153 submissions. The papers included in this book are organized according to the topical sections on cybersecurity and privacy, big data, blockchain and internet of things, and artificial intelligence/ machine learning security..作者: 冷漠 時間: 2025-3-31 21:15 作者: Statins 時間: 2025-3-31 23:37 作者: Anhydrous 時間: 2025-4-1 03:32 作者: 國家明智 時間: 2025-4-1 09:24
https://doi.org/10.1007/978-3-031-28659-9 to the authentication center. In view of this situation, block chain technology is introduced and applied to all kinds of power service access application scenarios through research and development. A block-chain-based power universal service access gateway is developed and tested. The test shows t作者: brassy 時間: 2025-4-1 11:22
V. B. John M.Sc., C. Eng., M.I.M., M.I.M.M.ty of all SQL queries. While the fine-grained access control (FGAC) method in the DBMS shall meet the sanity attribute requirements. It means that the answer to the query obtained by this method under the FGAC shall conform to the answer without the FGAC. In this article, a new query modification al