派博傳思國際中心

標(biāo)題: Titlebook: E-Business and Telecommunications; 12th International J Mohammad S. Obaidat,Pascal Lorenz Conference proceedings 2016 Springer Internationa [打印本頁]

作者: 愚蠢地活    時(shí)間: 2025-3-21 18:42
書目名稱E-Business and Telecommunications影響因子(影響力)




書目名稱E-Business and Telecommunications影響因子(影響力)學(xué)科排名




書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度




書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱E-Business and Telecommunications被引頻次




書目名稱E-Business and Telecommunications被引頻次學(xué)科排名




書目名稱E-Business and Telecommunications年度引用




書目名稱E-Business and Telecommunications年度引用學(xué)科排名




書目名稱E-Business and Telecommunications讀者反饋




書目名稱E-Business and Telecommunications讀者反饋學(xué)科排名





作者: 大暴雨    時(shí)間: 2025-3-21 20:51
978-3-319-30221-8Springer International Publishing Switzerland 2016
作者: 組成    時(shí)間: 2025-3-22 01:46

作者: 有特色    時(shí)間: 2025-3-22 05:17
https://doi.org/10.1007/978-0-387-89848-3hreats. When expressing a policy, one needs to characterise the traffic to which the policy applies by traffic identifiers. Low level traffic identifiers, such as IP addresses and port numbers, are available in each packet. Indeed, low level traffic identifiers are perfect for data plane routing and
作者: Keratin    時(shí)間: 2025-3-22 11:41
Zhonghui Xu,Jianchu Li,Mei Zhangut its flexibility concerning the algorithms used for securing a channel between two parties can also be a weakness, due to the possible agreement on insecure ciphers. State of the art cipher suites are not supported by all websites. We relate on an existing white paper (Applied Crypto Hardening) gi
作者: 牽索    時(shí)間: 2025-3-22 12:53
Congenital Disorders of the Larynxnd Freelancer, to name a few). This task is especially difficult because of the large number of items to look for and the need for manual compatibility by human resources. What we propose in this paper is an architecture for recruitment matchmaking that considers the user and opportunity models (con
作者: 牽索    時(shí)間: 2025-3-22 19:20

作者: Fantasy    時(shí)間: 2025-3-23 01:06
Dapeng Lu,Hongfei Liu,Jinling MaAlthough China has the largest number of Internet users in the world, users just started to use location sharing services in the last couple of years. This study aims to have a better understanding of the use of location sharing services on social networking platforms in China. To address this, four
作者: 噴油井    時(shí)間: 2025-3-23 02:49
https://doi.org/10.1007/978-3-642-96280-6 user data. This paper is focused on creating a user model that can be suitably adapted to advertisement applications. To integrate data from different publicly available sources, a social component has been added to the user model, to support advertisements adaptation. In addition, a straightforwar
作者: unstable-angina    時(shí)間: 2025-3-23 06:50

作者: Amenable    時(shí)間: 2025-3-23 09:56

作者: REIGN    時(shí)間: 2025-3-23 16:47

作者: 反話    時(shí)間: 2025-3-23 21:17

作者: allergen    時(shí)間: 2025-3-24 01:27

作者: Mitigate    時(shí)間: 2025-3-24 02:53

作者: 最初    時(shí)間: 2025-3-24 06:56

作者: Promotion    時(shí)間: 2025-3-24 12:42

作者: echnic    時(shí)間: 2025-3-24 17:02
Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/300016.jpg
作者: ANTH    時(shí)間: 2025-3-24 19:47
E-Business and Telecommunications978-3-319-30222-5Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: dissolution    時(shí)間: 2025-3-25 00:28
Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors enhancing the available operational data sets, collected by a Web Analytics application, providing better overview and supporting decision making for the entire corporation..The consumer has a choice to shop on-line from home via a browser or mobile app or go alternatively in person to a store and
作者: 外觀    時(shí)間: 2025-3-25 04:47

作者: 苦惱    時(shí)間: 2025-3-25 09:58
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibilityxamine the trend regarding supported cipher suites on webservers over time. To analyze this, we performed the scans twice with a one year gap. We compared the outcome of the two scans to see if we can determine a trend to better security as time goes by. And indeed, we found explicit enhancements in
作者: 有組織    時(shí)間: 2025-3-25 11:40
Understanding the Use of Location Sharing Services on Social Networking Platforms in Chinagly, some of non-users indicated that they were not aware of the availability of the location sharing services on social networking platforms and they did not know how to use location sharing services. Last but not least, some interviewees wanted to use authority management to deal with private issu
作者: aplomb    時(shí)間: 2025-3-25 16:53
The Entity Labeling Pattern for Modeling Operating Systems Access Controlible framework for formalization, specification and analysis of operating system security policies. We substantiate this claim by applying our method to the SELinux system and demonstrating the practical usage of the resulting model.
作者: 暫時(shí)休息    時(shí)間: 2025-3-25 21:52
Execution Path Classification for Vulnerability Analysis and Detectionr and program sink in an execution path, which we call an Information Block (IB). Severity quantifies the danger level of an IB using static analysis and a variation of the Information Gain algorithm. On the other hand, an IB’s Vulnerability rank quantifies how certain the tool is that an exploit ex
作者: 冷峻    時(shí)間: 2025-3-26 00:44

作者: Limpid    時(shí)間: 2025-3-26 05:35

作者: nitric-oxide    時(shí)間: 2025-3-26 08:55
https://doi.org/10.1007/978-0-387-89848-3of flows defined by low level traffic identifiers. SDN applications can apply policies based on both high level and low level traffic identifiers. We leave the southbound protocols intact. This paper provides two examples of High Level SDN paradigms – Application-Aware Networks and Identity-Aware Ne
作者: 東西    時(shí)間: 2025-3-26 15:27
Zhonghui Xu,Jianchu Li,Mei Zhangxamine the trend regarding supported cipher suites on webservers over time. To analyze this, we performed the scans twice with a one year gap. We compared the outcome of the two scans to see if we can determine a trend to better security as time goes by. And indeed, we found explicit enhancements in
作者: 用手捏    時(shí)間: 2025-3-26 19:50

作者: 線    時(shí)間: 2025-3-26 21:36
Development: Multiple Attractors,ible framework for formalization, specification and analysis of operating system security policies. We substantiate this claim by applying our method to the SELinux system and demonstrating the practical usage of the resulting model.
作者: 枯燥    時(shí)間: 2025-3-27 05:04
Attractors, Bifurcations, and Chaosr and program sink in an execution path, which we call an Information Block (IB). Severity quantifies the danger level of an IB using static analysis and a variation of the Information Gain algorithm. On the other hand, an IB’s Vulnerability rank quantifies how certain the tool is that an exploit ex
作者: 發(fā)微光    時(shí)間: 2025-3-27 05:54

作者: CANON    時(shí)間: 2025-3-27 12:32
Integrating Retail and e-Commerce Using Web Analytics and Intelligent Sensors paper explores and proposes techniques that will collect data from the physical shopping floor mainly via low cost mobile technologies and promote them for processing to a customized sophisticated e-Commerce Analyzer. This Analyzer connects the two worlds of physical and virtual shopping. The infor
作者: 本土    時(shí)間: 2025-3-27 14:58

作者: pineal-gland    時(shí)間: 2025-3-27 19:35
What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibilityut its flexibility concerning the algorithms used for securing a channel between two parties can also be a weakness, due to the possible agreement on insecure ciphers. State of the art cipher suites are not supported by all websites. We relate on an existing white paper (Applied Crypto Hardening) gi
作者: 職業(yè)拳擊手    時(shí)間: 2025-3-28 00:14
ARM: Architecture for Recruitment Matchmakingnd Freelancer, to name a few). This task is especially difficult because of the large number of items to look for and the need for manual compatibility by human resources. What we propose in this paper is an architecture for recruitment matchmaking that considers the user and opportunity models (con
作者: BLOT    時(shí)間: 2025-3-28 02:40

作者: CROW    時(shí)間: 2025-3-28 07:04
Understanding the Use of Location Sharing Services on Social Networking Platforms in ChinaAlthough China has the largest number of Internet users in the world, users just started to use location sharing services in the last couple of years. This study aims to have a better understanding of the use of location sharing services on social networking platforms in China. To address this, four
作者: 后退    時(shí)間: 2025-3-28 10:43
Large Scale Evaluation of an Adaptive E-Advertising User Model user data. This paper is focused on creating a user model that can be suitably adapted to advertisement applications. To integrate data from different publicly available sources, a social component has been added to the user model, to support advertisements adaptation. In addition, a straightforwar
作者: 帳單    時(shí)間: 2025-3-28 17:11
How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Ana employs a pre-transmission reservation scheme in order to improve the system output. Each station is equipped with a network interface with more than one tunable receivers in order to be able to receive more than one data packets during a time frame. As a results, the average probability of packet
作者: Digitalis    時(shí)間: 2025-3-28 19:31
A Scalable Honeynet Architecture for Industrial Control Systemsed, there is no clear information regarding non-targeted attacks. In order to analyse potentially malicious behaviour, we develop a large-scale honeynet system to capture and investigate network activities that use industrial protocols. The honeynet is composed of multiple honeypots that can be auto
作者: palpitate    時(shí)間: 2025-3-28 23:58

作者: GEON    時(shí)間: 2025-3-29 06:40
Automated Verification of e-Cash Protocolseet security and anonymity properties of e-cash. However, there are no general formal definitions that allow the automatic verification of e-cash protocols. In this paper, we propose a formal framework to define and verify security properties of e-cash protocols. To this end, we model e-cash protoco
作者: 規(guī)章    時(shí)間: 2025-3-29 09:29

作者: 健談    時(shí)間: 2025-3-29 14:01

作者: 吞下    時(shí)間: 2025-3-29 16:33
Execution Path Classification for Vulnerability Analysis and Detection bugs in applications’ source code. However, most of these tools are prone to non-negligible rates of false positives and false negatives, since they are designed to detect a priori specified types of bugs. Also, their analysis scalability to large programs is often an issue. To address these proble
作者: EWER    時(shí)間: 2025-3-29 22:24

作者: 減去    時(shí)間: 2025-3-30 00:25
Large Scale Evaluation of an Adaptive E-Advertising User Modeld and lightweight user model has been targeted, which should be easy to integrate into any existing system. A tool based on this model is introduced and a study that assesses the effectiveness of it via a trial run of a prototype of the tool with different users is described.
作者: committed    時(shí)間: 2025-3-30 07:23
Automated Verification of e-Cash Protocolsls in the applied .-calculus, and we formally define five relevant security properties. Finally, we validate our framework by analyzing, using the automatic tool ProVerif, four e-cash protocols: the online and the offline Chaum protocols, the Digicash protocol, and the protocol by Petersen and Poupard.
作者: Organonitrile    時(shí)間: 2025-3-30 08:25

作者: 琺瑯    時(shí)間: 2025-3-30 13:20





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
开封市| 铅山县| 丽江市| 望城县| 秦皇岛市| 泸溪县| 广宁县| 墨玉县| 黄浦区| 巴林右旗| 靖安县| 安丘市| 兰考县| 庄河市| 镶黄旗| 珲春市| 绍兴县| 高青县| 武强县| 梧州市| 厦门市| 朝阳县| 财经| 山阳县| 广宁县| 张家港市| 黄石市| 武穴市| 大安市| 浪卡子县| 寿阳县| 乌鲁木齐县| 色达县| 西丰县| 泸西县| 五大连池市| 宜阳县| 三亚市| 喀喇| 阳信县| 多伦县|