標題: Titlebook: Cyber Security; 19th China Annual Co Wei Lu,Yuqing Zhang,Chao Li Conference proceedings‘‘‘‘‘‘‘‘ 2022 The Editor(s) (if applicable) and The [打印本頁] 作者: 磨損 時間: 2025-3-21 17:47
書目名稱Cyber Security影響因子(影響力)
書目名稱Cyber Security影響因子(影響力)學(xué)科排名
書目名稱Cyber Security網(wǎng)絡(luò)公開度
書目名稱Cyber Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cyber Security被引頻次
書目名稱Cyber Security被引頻次學(xué)科排名
書目名稱Cyber Security年度引用
書目名稱Cyber Security年度引用學(xué)科排名
書目名稱Cyber Security讀者反饋
書目名稱Cyber Security讀者反饋學(xué)科排名
作者: 召集 時間: 2025-3-21 20:38
978-981-19-8284-2The Editor(s) (if applicable) and The Author(s) 2022作者: 小溪 時間: 2025-3-22 03:02 作者: giggle 時間: 2025-3-22 05:49
Software Process and Peopleware Basics analyzes the trend of the digital platform technology of the cloud-network integration business system, puts forward an intelligent data flow security strategy model of cloud-network integration, including expert rule judgment system of simple cloud scene and AI algorithm application model of compl作者: Cantankerous 時間: 2025-3-22 10:13 作者: 使閉塞 時間: 2025-3-22 14:04 作者: 使閉塞 時間: 2025-3-22 19:43
https://doi.org/10.1007/978-3-030-01276-2ine learning have been proposed to increase the efficacy of NIDSs, it still suffers from extreme data imbalance and the performance of existing algorithms depends highly on training datasets. To counterpart the class-imbalanced problem in network intrusion detection, it is necessary for models to ca作者: 瑪瑙 時間: 2025-3-22 21:25
https://doi.org/10.1007/978-3-030-01276-2to reduce unnecessary losses. At present, econnoisseur is mainly intercepted by rules. This method will fail when the new get the best deal method appears, and there is a certain lag. This paper identifies the econnoisseur from Knownsec Security Intelligence Brain’s e-commerce website visitors. Firs作者: arrogant 時間: 2025-3-23 05:21
The Basic Asymptotic of the Monodromy has brought security risks that cannot be ignored. The adversary can perform various Web attacks, including SQL Injection and Cross-Site Scripting (XSS), by tampering with the parameters of API. Efficient detection of parameter tampering attacks for API is critical to ensure the system is running i作者: 一再遛 時間: 2025-3-23 08:56
Asymptotic Spaces of Holomorphic Functionssponse to this phenomenon, this paper constructs a webpage tampering detection framework BCR. Based on the webpage to be detected, the webpage text data is segmented and extracted according to the webpage structure, the text features are extracted by using BiGRU model combined with context dependenc作者: 廣口瓶 時間: 2025-3-23 11:48 作者: 和平 時間: 2025-3-23 16:48 作者: Impugn 時間: 2025-3-23 18:27
Two Visual Systems in One Brainhas aroused a lot of academic attention. Previous researches have made effort to address this problem by various schemes to extract visual artifacts of non-pristine frames or discrepancy between real and fake videos, where the patch-based approaches are shown to be promising but mostly used in frame作者: 小卒 時間: 2025-3-24 01:38 作者: 倔強不能 時間: 2025-3-24 03:18 作者: 厭食癥 時間: 2025-3-24 10:26 作者: Sciatica 時間: 2025-3-24 14:12 作者: inflame 時間: 2025-3-24 15:43 作者: 指數(shù) 時間: 2025-3-24 20:20
An Intelligent Data Flow Security Strategy Model of Cloud-Network Integration analyzes the trend of the digital platform technology of the cloud-network integration business system, puts forward an intelligent data flow security strategy model of cloud-network integration, including expert rule judgment system of simple cloud scene and AI algorithm application model of compl作者: Memorial 時間: 2025-3-25 02:09
Brief Analysis for Network Security Issues in Mega-Projects Approved for Data Clustersty awareness, monitoring, early warning, disposal and evaluation capabilities of Mega-projects approved for data clusters. It makes a comprehensive analysis on the network security issues in Mega-projects approved for data clusters from dimensions of computing facility security, network facility sec作者: Outshine 時間: 2025-3-25 05:59
Considerations on?Evaluation of?Practical Cloud Data Protectionhas proposed a large body of technical mechanisms, operational processes, and practical solutions to achieve cloud security. In addition, diverse jurisdictions also present regulatory requirements on data protection to mitigate possible risks, for instance, unauthorized access, data leakage, sensiti作者: Forehead-Lift 時間: 2025-3-25 10:13 作者: CUB 時間: 2025-3-25 11:41
Anomaly Detection of E-commerce Econnoisseur Based on User Behaviorto reduce unnecessary losses. At present, econnoisseur is mainly intercepted by rules. This method will fail when the new get the best deal method appears, and there is a certain lag. This paper identifies the econnoisseur from Knownsec Security Intelligence Brain’s e-commerce website visitors. Firs作者: 死貓他燒焦 時間: 2025-3-25 18:46 作者: 合同 時間: 2025-3-25 22:37 作者: Ventricle 時間: 2025-3-26 01:38
Detecting Bitcoin Nodes by the Cyberspace Search Enginesetect the Bitcoin nodes. This paper introduces the Bitcoin’s P2P network and nodes including the reachable nodes and the unreachable nodes. Then, the results of detecting reachable nodes by the cyberspace search engines are showed. Next, the author proposes a new approach to find and verify the unre作者: 顯示 時間: 2025-3-26 04:24 作者: Dissonance 時間: 2025-3-26 09:41 作者: Torrid 時間: 2025-3-26 15:31
Research on Information Security Asset Value Assessment Methodologyhe same type of business, a comprehensive assessment method that takes into account the importance of the business carried by the assets is proposed. In this paper, four factors affecting business importance are selected as evaluation indicators, and the CRITIC objective assignment method is used to作者: Exonerate 時間: 2025-3-26 19:10
Knowledge Graph Construction Research From Multi-source Vulnerability Intelligence. At present, according to the needs of different business scenarios, relevant business personnel often need to search for different vulnerability information separately, relying on manpower, and the vulnerability intelligence distributed on the Internet has the characteristics of multi-source heter作者: 圖表證明 時間: 2025-3-27 00:26
1865-0929 ed and selected from 64 submissions. The papers are organized according to the following topical sections: ??data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition..978-981-19-8284-2978-981-19-8285-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Cpr951 時間: 2025-3-27 04:54 作者: 嬰兒 時間: 2025-3-27 08:32 作者: 植物群 時間: 2025-3-27 10:46
1865-0929 he 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022.?.The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ??data security; anomaly detection; cryptoc作者: Infantry 時間: 2025-3-27 14:38 作者: 逢迎白雪 時間: 2025-3-27 21:27 作者: hypnogram 時間: 2025-3-27 23:19 作者: 話 時間: 2025-3-28 04:47 作者: profligate 時間: 2025-3-28 09:50
The Measurement of Strain in the Exoskeletonf the case validation show that the calculation results of assessing the asset value by combining business importance are consistent with the actual value of the asset, and the comparison results with the traditional method show that the proposed method is more objective and reasonable in assessing the asset value.作者: 我要威脅 時間: 2025-3-28 13:07
A Self-supervised Adversarial Learning Approach for Network Intrusion Detection Systemdversarial perturbation styled data augmentation to improve the robustness of NIDS on rarely seen attacking types. State-of-the-art result was achieved on multiple frequently-used datasets and experiment conducted on cross-dataset setting demonstrated good generalization ability.作者: 樹膠 時間: 2025-3-28 16:23
Anomaly Detection of E-commerce Econnoisseur Based on User BehaviorForest Model. It is found that the improved Isolation Forest model based on BiLSTM can further improve the detection ability. Practical case studies showed that this method has certain validity and reference for the detection of econnoisseur.作者: Pedagogy 時間: 2025-3-28 18:44 作者: 教育學(xué) 時間: 2025-3-29 01:15
Research on Bitcoin Anti-anonymity Technology Based on Behavior Vectors Mapping and Aligning Model. Experimental test shows that the proposed anti-anonymity technology is more accurate and has better practical effects. Furthermore, the technology suits for the anti-anonymity of other virtual currencies as well.作者: 撫慰 時間: 2025-3-29 06:55 作者: harpsichord 時間: 2025-3-29 10:02
Detecting Bitcoin Nodes by the Cyberspace Search Enginesachable nodes by the cyberspace search engines. Finally, this paper illustrates the de-anonymization of some Bitcoin nodes by the cyberspace search engines, which map some node’s IP addresses to real Bitcoin entities, such as Zeblockchain (a browser website), Microwallet (a wallet website) and Laurentia Pool (a non-profit pool website).作者: 離開可分裂 時間: 2025-3-29 11:45