派博傳思國際中心

標(biāo)題: Titlebook: Cyber Security; 15th International A Xiaochun Yun,Weiping Wen,Yu Zhou Conference proceedings‘‘‘‘‘‘‘‘ 2019 The Editor(s) (if applicable) and [打印本頁]

作者: otitis-externa    時(shí)間: 2025-3-21 16:11
書目名稱Cyber Security影響因子(影響力)




書目名稱Cyber Security影響因子(影響力)學(xué)科排名




書目名稱Cyber Security網(wǎng)絡(luò)公開度




書目名稱Cyber Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cyber Security被引頻次




書目名稱Cyber Security被引頻次學(xué)科排名




書目名稱Cyber Security年度引用




書目名稱Cyber Security年度引用學(xué)科排名




書目名稱Cyber Security讀者反饋




書目名稱Cyber Security讀者反饋學(xué)科排名





作者: photopsia    時(shí)間: 2025-3-21 20:40
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/241740.jpg
作者: Terrace    時(shí)間: 2025-3-22 04:08
https://doi.org/10.1007/978-981-13-6621-5cyber security; identity authentication; mobile security; blockchain security; neural network; APT; malwar
作者: 罐里有戒指    時(shí)間: 2025-3-22 05:14
978-981-13-6620-8The Editor(s) (if applicable) and The Author(s) 2019
作者: 座右銘    時(shí)間: 2025-3-22 09:48
Administration of Workstations,telligence have arisen and changed people’s life. The identity authentication is a must for these services. To solve the problem, identity authentication system and method based on negative logic system (NLS) is proposed in the paper. NLS is introduced to improve security in the essence of attack an
作者: verdict    時(shí)間: 2025-3-22 13:11
https://doi.org/10.1007/978-3-642-74277-4, national network mall, E-charging, WeChat, with the rich application of various electronic channels, while gradually facilitating user use. There has been a problem of poor user experience such as registration and query service sharing, lack of unified management of multiple electronic service cha
作者: verdict    時(shí)間: 2025-3-22 20:15

作者: 多骨    時(shí)間: 2025-3-22 23:40

作者: 朝圣者    時(shí)間: 2025-3-23 04:47
Complex General Surgical Oncology Fellowshipime, however, its security issues are exposed constantly and cyber attacks have caused significant losses in it. At present, there is little concern and research in the field of network security of the blockchain. This paper introduces the applications of blockchain in various fields, systematically
作者: Congregate    時(shí)間: 2025-3-23 07:34
https://doi.org/10.1007/978-3-662-43119-1 more attention. Based on the variability of Webshells and the vulnerability of detection methods, this paper proposed a model that used deep learning to detect and implements the automatic identification of Webshells. For the shortcomings of the traditional detection models using machine learning a
作者: 杠桿支點(diǎn)    時(shí)間: 2025-3-23 09:47
Spain and the Non-Proliferation Treatyn intelligent networks based on traffic classification. The self-adaptive control mechanism which considers end-link cooperation in intelligent network implements service transportation with control method of the distributed-centralized combination. The mechanism optimize relevant network elements d
作者: Admonish    時(shí)間: 2025-3-23 14:05

作者: aesthetic    時(shí)間: 2025-3-23 21:03

作者: Blood-Vessels    時(shí)間: 2025-3-24 00:45

作者: 懸掛    時(shí)間: 2025-3-24 06:11

作者: 軍械庫    時(shí)間: 2025-3-24 10:09

作者: Magnificent    時(shí)間: 2025-3-24 13:29
Sensory Transduction and Codingted but connective. In this paper, different from the traditional Open System Interconnection (OSI) model, our research pays attention to application service layer and network control layer for the view of application. Two layers connect with each other by using IP mapping relationship. Firstly, to
作者: cavity    時(shí)間: 2025-3-24 16:15

作者: tympanometry    時(shí)間: 2025-3-24 22:48

作者: 一罵死割除    時(shí)間: 2025-3-25 00:01
Design of Multi-dimensional Electronic Channel Unified Identity Authentication Method for Power Info, national network mall, E-charging, WeChat, with the rich application of various electronic channels, while gradually facilitating user use. There has been a problem of poor user experience such as registration and query service sharing, lack of unified management of multiple electronic service cha
作者: JADED    時(shí)間: 2025-3-25 03:34
Extension of ISO/IEC27001 to Mobile Devices Security Managementaily life. Malicious samples in mobile devices are growing in double times each year from 2011 to 2017 in China. ISO/IEC 27000 family of standards helps organizations keep information assets secure, such as financial information, intellectual property, employee details or information entrusted to yo
作者: 注視    時(shí)間: 2025-3-25 09:13
Android Malware Detection Method Based on Frequent Pattern and Weighted Naive Bayes to effectively detect Android malware has become a significant problem. Permissions and API calls in Android applications can effectively reflect the behavior patterns of an Android application. Most researchers have only considered a single permission or API feature, and did not consider associati
作者: indignant    時(shí)間: 2025-3-25 11:49

作者: Lyme-disease    時(shí)間: 2025-3-25 19:18

作者: Tincture    時(shí)間: 2025-3-25 21:06
End-Link Collaboration Control Mechanism in Intelligent Networks Based on Traffic Classificationn intelligent networks based on traffic classification. The self-adaptive control mechanism which considers end-link cooperation in intelligent network implements service transportation with control method of the distributed-centralized combination. The mechanism optimize relevant network elements d
作者: osculate    時(shí)間: 2025-3-26 02:51
Malware Detection with Neural Network Using Combined Featuresand classifying the potential threats automatically. Deep learning is an acceptable method to process this increment. In this paper, we propose an innovative method for detecting malware which uses the combined features (static?+?dynamic) to classify whether a portable executable (PE) file is malici
作者: grenade    時(shí)間: 2025-3-26 04:36

作者: left-ventricle    時(shí)間: 2025-3-26 11:09
A Model of APT Attack Defense Based on Cyber Threat Detectioncommercial companies, for the purpose of stealing sensitive information, trade secrets or destroying important infrastructure. Traditional protection system is difficult to detect the APT attack, due to the method of the APT attack is unknown and uncertain. And the persisted evolution ability destro
作者: 必死    時(shí)間: 2025-3-26 15:14
A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Testsnerability leaks severely limits the widespread of crowdsourced tests. Existing crowdsourced test platforms have adopt various technical or management approaches to protect applications or systems under test, but none of them is able to remove the concerns about vulnerability leaks. This paper provi
作者: 極小    時(shí)間: 2025-3-26 19:08

作者: Mettle    時(shí)間: 2025-3-27 00:22
Association Visualization Analysis for the Application Service Layer and Network Control Layerted but connective. In this paper, different from the traditional Open System Interconnection (OSI) model, our research pays attention to application service layer and network control layer for the view of application. Two layers connect with each other by using IP mapping relationship. Firstly, to
作者: 制定法律    時(shí)間: 2025-3-27 03:32
Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation. Security protection framework based on cloud-channel-device cooperation is proposed in this paper to solve the issue. The trust base is introduced to channel-end to improve trust of secure accessing device. Then, the trust and security module are designed in the cloud-end. Meanwhile, access contro
作者: left-ventricle    時(shí)間: 2025-3-27 08:50
Conference proceedings‘‘‘‘‘‘‘‘ 2019g, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence sec
作者: 中止    時(shí)間: 2025-3-27 09:52
1865-0929 in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intell
作者: decipher    時(shí)間: 2025-3-27 14:03
Spain and the Non-Proliferation Treatyk implements service transportation with control method of the distributed-centralized combination. The mechanism optimize relevant network elements devices and reasonably allocates limited resources to improve end-to-end target depending on given strategies.
作者: eczema    時(shí)間: 2025-3-27 19:50
Administration of Workstations,nd authentication are proposed. The proposed method can improve security and provide identity authentication for cloud, IoT, etc. The theoretical performance analysis proves that it is feasible and effective.
作者: gerrymander    時(shí)間: 2025-3-28 01:09
Gerhard Fels,George M. von Furstenbergurity risks. This paper analyzes mobile devices security issues, and gives the drawback for 27001 in mobile security. Finally, this paper gives a consideration to these issues under ISO/IEC 27001 information security management system framework.
作者: 河潭    時(shí)間: 2025-3-28 03:22

作者: Arroyo    時(shí)間: 2025-3-28 07:24
Research on Identity Authentication Method Based on Negative Logic Systemnd authentication are proposed. The proposed method can improve security and provide identity authentication for cloud, IoT, etc. The theoretical performance analysis proves that it is feasible and effective.
作者: 誹謗    時(shí)間: 2025-3-28 13:04
Extension of ISO/IEC27001 to Mobile Devices Security Managementurity risks. This paper analyzes mobile devices security issues, and gives the drawback for 27001 in mobile security. Finally, this paper gives a consideration to these issues under ISO/IEC 27001 information security management system framework.
作者: 四指套    時(shí)間: 2025-3-28 14:53
Association Visualization Analysis for the Application Service Layer and Network Control Layernodes in network control layer aligned more structured and well-distributed efficiently. Finally, we merge the application service layer and the network control layer into a two-layer visualization model. Based on our two-layer model, the whole network trend, topology and incidence relation can be conveniently grasped.
作者: 要控制    時(shí)間: 2025-3-28 21:12
A Supply-Side Agenda for Germanymalwares, but the detection of maliciousness according to this combination mode is too absolute. This paper proposes a malware detection method, which combines the advantages of frequent pattern mining and Naive Bayes to effectively identify Android malwares.
作者: padding    時(shí)間: 2025-3-28 23:51

作者: entice    時(shí)間: 2025-3-29 05:32

作者: 多嘴多舌    時(shí)間: 2025-3-29 07:55
https://doi.org/10.1007/978-1-349-10813-8tra features such as cookie and users information, which is unavailable by using active method, from online traffic and add them to the feature sets created by proceeding active method. According to the experiment, we can have 95.43% true positive rate and 3.90% false positive rate under real data flow in this way.
作者: 香料    時(shí)間: 2025-3-29 15:14
Carnegie Mellon’s Facet / Emerald Systemilities, but also valid for unknown vulnerabilities. Finally, the proposed architecture is tested by real vulnerabilities. The results show that, with proper rules, most of the concealing behaviors can be detected.
作者: 聚集    時(shí)間: 2025-3-29 16:01
The Life Cycle of Neurotransmittersure accessing and provide security solutions for mobile office, IoT security, information security management and control, etc. The effectiveness of the framework has been proved by its application to the market.
作者: headlong    時(shí)間: 2025-3-29 19:59

作者: accessory    時(shí)間: 2025-3-30 02:16

作者: 展覽    時(shí)間: 2025-3-30 04:05
Malware Detection with Neural Network Using Combined Featuresrse situations and the performances of different machine learning models. The experiments prove the effectiveness of our model and show that our method is able to detect unknown malicious samples well.
作者: 戰(zhàn)勝    時(shí)間: 2025-3-30 11:03

作者: 鴕鳥    時(shí)間: 2025-3-30 16:10

作者: 不可知論    時(shí)間: 2025-3-30 17:36

作者: Bother    時(shí)間: 2025-3-30 22:30

作者: 冒失    時(shí)間: 2025-3-31 03:56

作者: Pastry    時(shí)間: 2025-3-31 05:08

作者: 下邊深陷    時(shí)間: 2025-3-31 11:45
Ascending Somatosensory Systemss the process of web attacks according to various types of vulnerabilities and gives the defensive means separately. This system can be used to conduct security training, test security tools, and practice common penetration testing techniques for network administrators and web developers.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
太白县| 香格里拉县| 临安市| 合江县| 凤城市| 泸州市| 萨嘎县| 台中市| 海兴县| 兰州市| 忻城县| 茌平县| 龙井市| 灵丘县| 彰化县| 沾化县| 堆龙德庆县| 北票市| 揭西县| 庄河市| 随州市| 镇赉县| 裕民县| 张家港市| 洛川县| 墨江| 云阳县| 封丘县| 太保市| 黄浦区| 永寿县| 工布江达县| 河间市| 宜兴市| 东安县| 祁阳县| 高要市| 宁津县| 伊川县| 南京市| 冕宁县|