派博傳思國(guó)際中心

標(biāo)題: Titlebook: Cloud Computing and Security; Third International Xingming Sun,Han-Chieh Chao,Elisa Bertino Conference proceedings 2017 Springer Internati [打印本頁(yè)]

作者: Abridge    時(shí)間: 2025-3-21 17:52
書目名稱Cloud Computing and Security影響因子(影響力)




書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Cloud Computing and Security被引頻次




書目名稱Cloud Computing and Security被引頻次學(xué)科排名




書目名稱Cloud Computing and Security年度引用




書目名稱Cloud Computing and Security年度引用學(xué)科排名




書目名稱Cloud Computing and Security讀者反饋




書目名稱Cloud Computing and Security讀者反饋學(xué)科排名





作者: 反感    時(shí)間: 2025-3-21 22:38

作者: FELON    時(shí)間: 2025-3-22 00:51

作者: Insatiable    時(shí)間: 2025-3-22 04:48
A Novel Robust Reversible Watermarking Scheme Based on IWTs respectively. Firstly, the robust watermarks are embedded into the mid-low frequency coefficients after the image transformed from spatial domain to frequency domain. Then, side information that used to ensure the reversibility is embedded in spatial domain by the form of fragile watermarks. 5-3 i
作者: promote    時(shí)間: 2025-3-22 10:10

作者: WAG    時(shí)間: 2025-3-22 12:55

作者: WAG    時(shí)間: 2025-3-22 21:06

作者: Free-Radical    時(shí)間: 2025-3-22 22:46
Quantum Computer Simulation on GPU Cluster Incorporating Data Localitysable platform for this task. However, the high cost of communication between GPUs makes the simulation inefficiency. To overcome this drawback, we propose the following two methods. (1) A method for GPU cluster quantum simulation to improve the data locality is introduced, and two schemes for data
作者: Harbor    時(shí)間: 2025-3-23 01:46

作者: Agronomy    時(shí)間: 2025-3-23 09:33

作者: 永久    時(shí)間: 2025-3-23 12:47

作者: 營(yíng)養(yǎng)    時(shí)間: 2025-3-23 15:03
Improved STDM Watermarking Using Semantic Information-Based JND Model. The JND model can provide a superior tradeoff between robustness and fidelity. However, the conventional JND models are not fit for the quantization-based watermarking, as the image has been altered by watermarking embedding. In this paper, we present an improved spread transform dither modulation
作者: ingestion    時(shí)間: 2025-3-23 18:55

作者: fertilizer    時(shí)間: 2025-3-24 00:14

作者: Trypsin    時(shí)間: 2025-3-24 02:29
SIEM Based on Big Data Analysisment (SIEM) systems have faced with diversity of Volume Big data sources, so it is necessary that big data analysis should be used. This paper presents the architecture and principle of SIEM systems which use popular big data technology. The information security data is transferred from flume to Fli
作者: Gorilla    時(shí)間: 2025-3-24 10:04
Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant System The most effective way in green cloud computing is using virtual machine (VM) consolidation to pack VMs into a smaller amount of physical machines (PMs), which can save energy by switching off the idle PMs. However, in traditional static workload approach, VMs are over-provisioned with a static cap
作者: BIAS    時(shí)間: 2025-3-24 12:23

作者: JUST    時(shí)間: 2025-3-24 18:29

作者: Mortal    時(shí)間: 2025-3-24 21:09
,Bauelemente, Datenbl?tter, Grenzwerte,tum computers, the effects of the basic quantum gate and the equivalent relation are first briefly concluded in this paper. Base on the general-purpose graphics processing units (GPGPU) environment, the novel basic quantum gate simulation platform is achieved, on which any arbitrary quantum algorith
作者: Antarctic    時(shí)間: 2025-3-24 23:34
Abstraktion elektronischer Bauelemente,tly extracted from the received video file. It has the property that can well reduce the error propagated between spatially/temporally correlated macro-blocks. It is required that, the embedded information at the sender side should well capture/reflect the video characteristics. Moreover, the retrie
作者: 使成核    時(shí)間: 2025-3-25 05:12

作者: ATRIA    時(shí)間: 2025-3-25 11:04
Grundbegriffe der Elektrotechnik, transmitted in compressed form, so research and development of such a scheme is necessary. Hong et al. proposed a reversible information hiding based approach based on AMBTC compression of images to provide considerable embedding capacity and effectively reduce the bit-rate. However, it did not car
作者: 強(qiáng)有力    時(shí)間: 2025-3-25 11:56
,Nachhaltige Unternehmensführung,nt by intentional attackers, it has become a very important topic in image forensics. Most of the existing detection methods designed to region duplication are based on the exhaustive block-matching of image pixels or transformed coefficients. They may be not efficient when the duplicate regions are
作者: 草率男    時(shí)間: 2025-3-25 19:10

作者: 切掉    時(shí)間: 2025-3-25 21:26

作者: BANAL    時(shí)間: 2025-3-26 00:52
Kapitel 3: Anwendungen 1. Ordnung,watermarking schemes are proposed to prevent malicious attacks in recent years. An innovative algorithm is proposed in this work to resist key frames dropping and detect the subtitle tampered. Firstly, Simple Linear Iterative Clustering (SLIC) Superpixels are used to extract the natural codes of the
作者: WAG    時(shí)間: 2025-3-26 07:32

作者: 橢圓    時(shí)間: 2025-3-26 09:50

作者: 咽下    時(shí)間: 2025-3-26 13:56

作者: evasive    時(shí)間: 2025-3-26 17:23

作者: MINT    時(shí)間: 2025-3-26 21:46

作者: 色情    時(shí)間: 2025-3-27 01:09

作者: 附錄    時(shí)間: 2025-3-27 05:30

作者: 合同    時(shí)間: 2025-3-27 09:32

作者: 河潭    時(shí)間: 2025-3-27 14:53

作者: 窩轉(zhuǎn)脊椎動(dòng)物    時(shí)間: 2025-3-27 18:02

作者: Formidable    時(shí)間: 2025-3-27 23:57

作者: 左右連貫    時(shí)間: 2025-3-28 04:32

作者: 動(dòng)物    時(shí)間: 2025-3-28 08:49

作者: Efflorescent    時(shí)間: 2025-3-28 10:36

作者: 心胸狹窄    時(shí)間: 2025-3-28 16:51
Coverless Information Hiding Technology Research Based on News Aggregationhides N in a news web by changing the order of news headlines. Experimental results and analysis show that this method is robust for any current steganalysis algorithm, and effective for stego-message delivery.
作者: arthroplasty    時(shí)間: 2025-3-28 21:33

作者: countenance    時(shí)間: 2025-3-29 01:17

作者: 熄滅    時(shí)間: 2025-3-29 03:47

作者: Perceive    時(shí)間: 2025-3-29 10:14

作者: Parameter    時(shí)間: 2025-3-29 13:18
https://doi.org/10.34157/9783648157725ography method based on patched block. This strategy can make the post-processing sub-image be influenced by all the sub-images which have already embedded. The experimental results show that the proposed method is more secure than CMD image steganographic method.
作者: indignant    時(shí)間: 2025-3-29 18:54
Schnellfilter ihr Bau und Betrieb by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.
作者: Cosmopolitan    時(shí)間: 2025-3-29 22:37
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling Experimental results show that the proposed scheme can not only provide large watermark capacity and good imperceptibility, but also can resist the impact of print-scan on the image, and has strong robustness.
作者: synovium    時(shí)間: 2025-3-30 02:49

作者: 貪婪的人    時(shí)間: 2025-3-30 05:00
Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application by reference the technique for order preference by similarity to an ideal solution (TOPSIS) theory, 2 kinds of service selection algorithm are designed to obtain the optimal service reflecting user’s QoS needs. The last, some experiments demonstrate the superiority and efficiency of our approach.
作者: 混合物    時(shí)間: 2025-3-30 08:45

作者: scotoma    時(shí)間: 2025-3-30 15:34

作者: candle    時(shí)間: 2025-3-30 19:42

作者: AWE    時(shí)間: 2025-3-30 20:48

作者: Ferritin    時(shí)間: 2025-3-31 01:36
SIEM Based on Big Data Analysisend, the full paper is summarized and the future work should be the usage of stream computing in the SIEM to solve inform security problem in large-scale network with the continuously producing information security data.
作者: 悄悄移動(dòng)    時(shí)間: 2025-3-31 05:06

作者: 招募    時(shí)間: 2025-3-31 11:34

作者: chemoprevention    時(shí)間: 2025-3-31 14:02
https://doi.org/10.1007/978-3-662-62146-2 frequent words distance, normal texts containing the secret information could be retrieved from the text database, and will be sent to the receiver without any modification. Because the embedding is not needed, the proposed method could be able to escape from almost all state-of-the-art steganalysis methods.




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
安仁县| 凯里市| 南召县| 志丹县| 满城县| 乐山市| 黄龙县| 芦山县| 永州市| 牡丹江市| 凤庆县| 宾川县| 敦化市| 电白县| 和顺县| 客服| 新疆| 平南县| 兰考县| 寻乌县| 上高县| 西贡区| 阳山县| 西城区| 张家港市| 托克托县| 宁河县| 绥阳县| 苏州市| 车致| 彭阳县| 师宗县| 招远市| 将乐县| 平泉县| 曲水县| 屯门区| 涿州市| 富顺县| 崇礼县| 光山县|