標(biāo)題: Titlebook: Cyberspace Safety and Security; 9th International Sy Sheng Wen,Wei Wu,Aniello Castiglione Conference proceedings 2017 Springer Internationa [打印本頁(yè)] 作者: Fillmore 時(shí)間: 2025-3-21 19:47
書目名稱Cyberspace Safety and Security影響因子(影響力)
書目名稱Cyberspace Safety and Security影響因子(影響力)學(xué)科排名
書目名稱Cyberspace Safety and Security網(wǎng)絡(luò)公開度
書目名稱Cyberspace Safety and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cyberspace Safety and Security被引頻次
書目名稱Cyberspace Safety and Security被引頻次學(xué)科排名
書目名稱Cyberspace Safety and Security年度引用
書目名稱Cyberspace Safety and Security年度引用學(xué)科排名
書目名稱Cyberspace Safety and Security讀者反饋
書目名稱Cyberspace Safety and Security讀者反饋學(xué)科排名
作者: Narcissist 時(shí)間: 2025-3-22 00:11 作者: 疲勞 時(shí)間: 2025-3-22 02:21
A DP Canopy ,-Means Algorithm for Privacy Preservation of Hadoop Platform,lgorithm on MapReduce. As a result, the improved Canopy algorithm can optimize the selection of the number of centers and clusters on Hadoop platform, so the proposed .-means algorithm can improve security, usability and efficiency of calculation.作者: 美麗的寫 時(shí)間: 2025-3-22 07:38
HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM,dean Distance and a greedy-like algorithm to generate the malicious behaviour models. At runtime, a sliding-window-based detection module is used to detect malicious behaviours. We have experimented with the samples of . and the result validates the effectiveness of the proposed methodology.作者: Obscure 時(shí)間: 2025-3-22 12:09 作者: 推延 時(shí)間: 2025-3-22 16:57
Detection of Lurkers in Online Social Networks,we discuss how the most diffused centrality measures – that have been defined over the introduced model – can be efficiently applied for a number of data privacy issues, such as lurkers detection, especially in “interest-based” social networks. Some preliminary experiments using the Yelp dataset are finally presented.作者: 推延 時(shí)間: 2025-3-22 18:17 作者: 情感 時(shí)間: 2025-3-23 00:37
0302-9743 s focus on cyberspace safety and security such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace..978-3-319-69470-2978-3-319-69471-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 表兩個(gè) 時(shí)間: 2025-3-23 03:00
Yuejia Li,Ziyi Mei,Jie Li,Jeffrey M. Gimbles the taint propagation within a component, between components and during the reflection call to detect the potential Intent injection vulnerability. Experimental results validate the effectiveness of IntentSoot in various kinds of applications.作者: phase-2-enzyme 時(shí)間: 2025-3-23 07:44
https://doi.org/10.1057/9781137269201paper, we present OnDrop, an on-the-fly ROP protection system by using the OS internal facilities. Our system is compatible with the existing programs, and its protection layer can be added on demand. The experiments show that OnDrop can detect ROP attacks effectively with a little performance overhead.作者: Ethics 時(shí)間: 2025-3-23 11:41 作者: Negligible 時(shí)間: 2025-3-23 13:53 作者: Defraud 時(shí)間: 2025-3-23 18:31 作者: 前奏曲 時(shí)間: 2025-3-23 23:16 作者: ABYSS 時(shí)間: 2025-3-24 05:01
https://doi.org/10.1007/978-3-540-48351-9 experiments carried out on the Dresden image collection confirms the effectiveness of the proposed NS-ISI. When the noisy samples present, the identification accuracy of NS-ISI is significantly better than traditional methods.作者: Creatinine-Test 時(shí)間: 2025-3-24 09:42
Sonja Lehrke,Reinhold G. Laessleevices (or called nodes). In the evaluation, we collaborate with healthcare organizations and implement our approach in a real simulated MSN environment. Experimental results demonstrate that our approach is promising in effectively identifying malicious MSN nodes.作者: 吞噬 時(shí)間: 2025-3-24 12:54 作者: 分開 時(shí)間: 2025-3-24 15:35 作者: Phonophobia 時(shí)間: 2025-3-24 20:06
A Fair Three-Party Contract Singing Protocol Based on Blockchain,ture and the blockchain?to accomplish the fair exchange. As result, a dishonest party will be monetarily penalized as it aborts after receiving the current output. Moreover, the privacy of the contract content can be preserved on the public chain.作者: ITCH 時(shí)間: 2025-3-25 02:11 作者: 泥土謙卑 時(shí)間: 2025-3-25 04:51
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption,curity needs. Finally, a concrete scheme supporting ciphertext verifiability is constructed on prime-order groups to improve computing efficiency. We prove that the scheme satisfies IND-sAA-sCCA2 security with the help of a Chameleon hash function.作者: 時(shí)代錯(cuò)誤 時(shí)間: 2025-3-25 09:44 作者: 知識(shí)分子 時(shí)間: 2025-3-25 14:15 作者: Affiliation 時(shí)間: 2025-3-25 16:15
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance,hat, on the premise that target users can be discovered, the proposed algorithm could achieve higher accuracy compared with the classical space partition based algorithm and the heuristic number theory based algorithm. The highest geolocating accuracy is within 10?m and 56% of geolocation results are within 60?m.作者: Ointment 時(shí)間: 2025-3-25 23:17
0302-9743 in October 2017. The 31 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 120 submissions.. The papers focus on cyberspace safety and security such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and作者: 功多汁水 時(shí)間: 2025-3-26 02:11 作者: 常到 時(shí)間: 2025-3-26 07:56 作者: Grievance 時(shí)間: 2025-3-26 12:30
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications,s the taint propagation within a component, between components and during the reflection call to detect the potential Intent injection vulnerability. Experimental results validate the effectiveness of IntentSoot in various kinds of applications.作者: Enliven 時(shí)間: 2025-3-26 15:59 作者: ineluctable 時(shí)間: 2025-3-26 18:37
Detection of Lurkers in Online Social Networks,works (OSNs), together with the content that is generated, shared and used within the related environments, using an hypergraph-based approach. Then, we discuss how the most diffused centrality measures – that have been defined over the introduced model – can be efficiently applied for a number of d作者: Engulf 時(shí)間: 2025-3-26 21:30 作者: 強(qiáng)行引入 時(shí)間: 2025-3-27 04:02 作者: Cervical-Spine 時(shí)間: 2025-3-27 08:18 作者: 一致性 時(shí)間: 2025-3-27 12:03 作者: hypotension 時(shí)間: 2025-3-27 17:26 作者: Amendment 時(shí)間: 2025-3-27 19:42 作者: 抗原 時(shí)間: 2025-3-27 22:24
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption,ultiple authorities issuing secret keys for users with attributes from different domains in considering of privacy preserving and efficiency. In addition, it supports large-universe attributes allowing attributes denoted as any string in a large universe. Furthermore, it realizes an efficient revoca作者: 不吉祥的女人 時(shí)間: 2025-3-28 04:22
CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch,ims to address those problems by outsourcing the functions of traditional hardware-based middleboxes to high volume servers in a cloud. This technology is promising but still faces a few challenges. First, the widely adopted data encryption techniques contradict with payload inspection needs of some作者: quiet-sleep 時(shí)間: 2025-3-28 06:22 作者: 報(bào)復(fù) 時(shí)間: 2025-3-28 12:01
Privacy-Preserving Comparable Encryption Scheme in Cloud Computing,ult for users to make comparable queries over ciphertexts. A .hort .omparable .ncryption (SCE) scheme has been emerged as a fundamental solution to enable data owners to conduct comparable queries over encrypted data. Unfortunately, it infers high computational and storage overhead as well as econom作者: LEVER 時(shí)間: 2025-3-28 16:29 作者: 牢騷 時(shí)間: 2025-3-28 20:32 作者: MEN 時(shí)間: 2025-3-29 00:29 作者: Small-Intestine 時(shí)間: 2025-3-29 03:04 作者: 創(chuàng)新 時(shí)間: 2025-3-29 11:11
A Fibonacci Based Batch Auditing Protocol for Cloud Data,gh most of the existing auditing protocols have considered batch auditing to save resources in the auditor side, the design of methods to locate the specific positions of the corrupted data blocks is ignored. In this paper, we propose a novel batch auditing protocol based on the Fibonacci sequence t作者: 樹上結(jié)蜜糖 時(shí)間: 2025-3-29 14:34
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance,iew of the difficulty to pinpoint users’ location in real-world due to WeChat location protection strategy, a WeChat User geolocating Algorithm based on reported and actual distance relation analysis is proposed. Firstly, statistical characteristics of the relation between reported distance and actu作者: 轉(zhuǎn)換 時(shí)間: 2025-3-29 16:50 作者: scotoma 時(shí)間: 2025-3-29 23:01 作者: 四指套 時(shí)間: 2025-3-30 01:45
Achieving Differential Privacy of Data Disclosure from Non-intrusive Load Monitoring in Smart Grid,dition, Laplace noise is added to the behavior parameter, which is different from the traditional methods that usually add noise to the energy consumption data. The analysis shows that the proposed scheme can get a better trade-off between utility and privacy compared with other popular methods.作者: EWER 時(shí)間: 2025-3-30 06:48 作者: 步履蹣跚 時(shí)間: 2025-3-30 08:28 作者: 一條卷發(fā) 時(shí)間: 2025-3-30 13:40 作者: 大笑 時(shí)間: 2025-3-30 19:28
Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation,ch based on two-phase Locality-Sensitive Hashing (LSH), named .., in this paper. Concretely, in .., we first look for the “similar friends” of a target user through a privacy-preserving two-phase LSH process; afterwards, we determine the services preferred by the “similar friends” of the target user作者: acrimony 時(shí)間: 2025-3-30 21:06
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of II adversaries. In addition, a formal security proof is provided to demonstrate that, under adaptively chosen message attacks, the proposed scheme is provably secure against Type I and Type II adversaries in the random oracle model. When compared with other known pairing-free certificateless signatu作者: acolyte 時(shí)間: 2025-3-31 01:47
,Experimentelle überern?hrung beim Menschen,dition, Laplace noise is added to the behavior parameter, which is different from the traditional methods that usually add noise to the energy consumption data. The analysis shows that the proposed scheme can get a better trade-off between utility and privacy compared with other popular methods.作者: AGGER 時(shí)間: 2025-3-31 07:10
https://doi.org/10.1007/978-3-662-05603-5tive key-value operations with enclave protection. Thirdly, we implement a secure client library to maintain the original cache semantics for application compatibility. The experimental result showed that the proposed solutions achieves comparable performance with the traditional key-value store sys作者: Emg827 時(shí)間: 2025-3-31 09:34 作者: CLAIM 時(shí)間: 2025-3-31 15:10 作者: Concerto 時(shí)間: 2025-3-31 19:10
Essregeln, strukturierte Esstagech based on two-phase Locality-Sensitive Hashing (LSH), named .., in this paper. Concretely, in .., we first look for the “similar friends” of a target user through a privacy-preserving two-phase LSH process; afterwards, we determine the services preferred by the “similar friends” of the target user作者: Evacuate 時(shí)間: 2025-3-31 23:18
Introduction: Issues and Overview,II adversaries. In addition, a formal security proof is provided to demonstrate that, under adaptively chosen message attacks, the proposed scheme is provably secure against Type I and Type II adversaries in the random oracle model. When compared with other known pairing-free certificateless signatu作者: 手術(shù)刀 時(shí)間: 2025-4-1 04:54
Conference proceedings 2017 2017. The 31 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 120 submissions.. The papers focus on cyberspace safety and security such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace..作者: 成份 時(shí)間: 2025-4-1 08:13 作者: Conscientious 時(shí)間: 2025-4-1 12:22 作者: granite 時(shí)間: 2025-4-1 14:35 作者: GOAT 時(shí)間: 2025-4-1 21:42
https://doi.org/10.1007/978-1-0716-3762-3works (OSNs), together with the content that is generated, shared and used within the related environments, using an hypergraph-based approach. Then, we discuss how the most diffused centrality measures – that have been defined over the introduced model – can be efficiently applied for a number of d