標(biāo)題: Titlebook: Emerging Information Security and Applications; Second International Weizhi Meng,Sokratis K. Katsikas Conference proceedings 2022 Springer [打印本頁(yè)] 作者: Localized 時(shí)間: 2025-3-21 18:45
書目名稱Emerging Information Security and Applications影響因子(影響力)
書目名稱Emerging Information Security and Applications影響因子(影響力)學(xué)科排名
書目名稱Emerging Information Security and Applications網(wǎng)絡(luò)公開度
書目名稱Emerging Information Security and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Information Security and Applications被引頻次
書目名稱Emerging Information Security and Applications被引頻次學(xué)科排名
書目名稱Emerging Information Security and Applications年度引用
書目名稱Emerging Information Security and Applications年度引用學(xué)科排名
書目名稱Emerging Information Security and Applications讀者反饋
書目名稱Emerging Information Security and Applications讀者反饋學(xué)科排名
作者: 含糊 時(shí)間: 2025-3-21 23:20 作者: ORE 時(shí)間: 2025-3-22 03:35
1865-0929 elected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to?enhance information and application security in practice.?.*Due to the COVID-19 pandemic the conference was held online.?.978-3-030-93955-7978-3-030-93956-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 嘮叨 時(shí)間: 2025-3-22 05:01
,Rechtliches Umfeld für Nachhaltigkeit,uences will be severe. Although some existing health code schemes preserve the privacy, but most of them either do not support fine-grained auditability or are centralized health code storage. Therefore, we propose an auditable and privacy-preserving health QR code scheme based on blockchain.作者: clarify 時(shí)間: 2025-3-22 10:27 作者: 圍巾 時(shí)間: 2025-3-22 16:21
https://doi.org/10.34157/978-3-648-17157-8s on database intrusion detection systems in the context of detecting insider threats and examines existing approaches in the literature on detecting malicious accesses by an insider to Database Management Systems (DBMS).作者: 圍巾 時(shí)間: 2025-3-22 18:18
Conference proceedings 2022held in Copenhagen, Denmark, in November 2021.*.The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to?enhance information and application security作者: FIG 時(shí)間: 2025-3-23 00:57
,APHC: Auditable and?Privacy Preserving Health QR Code Based on?Blockchain,uences will be severe. Although some existing health code schemes preserve the privacy, but most of them either do not support fine-grained auditability or are centralized health code storage. Therefore, we propose an auditable and privacy-preserving health QR code scheme based on blockchain.作者: Subjugate 時(shí)間: 2025-3-23 05:10
AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger,al identity based on the blockchain to improve over the traditional know your customer (KYC) authentication process by combining KYC and suspicious transaction identification. With the help of cryptographic tools such as zero-knowledge proofs, suspicious interbank transactions can be effectively identified while the legal privacy is preserved.作者: Crepitus 時(shí)間: 2025-3-23 09:25 作者: 植物學(xué) 時(shí)間: 2025-3-23 12:13
Nachhaltigkeit als Unternehmensstrategiees to meet the corresponding security, which is based on the group testing and cryptographic hash functions. We show the effectiveness of our scheme by providing the corresponding security proof and performance evaluation comparisons.作者: STIT 時(shí)間: 2025-3-23 17:47
Practical and Provable Secure Vehicular Component Protection Scheme,es to meet the corresponding security, which is based on the group testing and cryptographic hash functions. We show the effectiveness of our scheme by providing the corresponding security proof and performance evaluation comparisons.作者: 率直 時(shí)間: 2025-3-23 21:08 作者: coddle 時(shí)間: 2025-3-23 23:29
Nachhaltigkeit im Beschaffungsmanagements work, we show that anomaly detection algorithms can be improved by considering thread information. For this purpose, we extend seven algorithms and comparatively evaluate their effectiveness with and without the use of thread information. The evaluation is based on the LID-DS dataset providing suitable thread information.作者: Axillary 時(shí)間: 2025-3-24 06:26
Industrielle Entwicklungsphasenified users’ willingness to share an information with a third-party strongly depends on the sensitivity levels of the information type and the third-party categories. Based on our findings, we provide suggestions for privacy regulators, policymakers, companies, and researchers to mitigate and resolve IoT privacy risks.作者: 細(xì)絲 時(shí)間: 2025-3-24 10:11 作者: Scleroderma 時(shí)間: 2025-3-24 12:43 作者: exhilaration 時(shí)間: 2025-3-24 14:58 作者: Between 時(shí)間: 2025-3-24 19:16 作者: TAG 時(shí)間: 2025-3-25 02:01
AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable Distributed Ledger,, due to customer privacy protection, market competition, and other reasons, the current regulatory authorities and financial institutions have not yet formed a customer information sharing mechanism, which makes it difficult to monitor suspicious transactions. In paper, we use the distributed digit作者: oxidize 時(shí)間: 2025-3-25 06:19
,Granularity and?Usability in?Authorization Policies,ich are used to limit the actions a principal may exercise on a resource. We compare two designs from the standpoint of the ease with which such policies can be devised and expressed. The two designs we consider are read-write-execute policies in UNIX, which was designed many decades ago, and identi作者: 言行自由 時(shí)間: 2025-3-25 10:50 作者: Amylase 時(shí)間: 2025-3-25 15:13
SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures,are of the security vulnerabilities that come with the use of Bluetooth. To this aid, we provide a comprehensive analysis of the security attacks and ways for users to mitigate these attacks focusing on Bluetooth technologies by reviewing prior literature. Here we analyze . peer-reviewed academic ar作者: Panther 時(shí)間: 2025-3-25 17:50 作者: 心胸狹窄 時(shí)間: 2025-3-25 21:27
Digital Twin Monitoring for Cyber-Physical Access Control,l is generally perimeter-based, where assets can be vulnerable to a malicious entity once they have entered the perimeter of the space. Therefore, the relative distances between subjects and objects are needed to enforce cyber-physical access control within the perimeter of the physical space. The i作者: 流動(dòng)才波動(dòng) 時(shí)間: 2025-3-26 03:03 作者: agitate 時(shí)間: 2025-3-26 05:08
,Database Intrusion Detection Systems (DIDs): Insider Threat Detection via?Behaviour-Based Anomaly Dnsider threat to data security means that an insider steals or leaks sensitive personal information. Database Intrusion detection systems, specifically behaviour-based database intrusion detection systems, have been shown effective in detecting insider attacks. This paper presents background concept作者: BLANK 時(shí)間: 2025-3-26 08:49
NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint, comprehensive analysis of extensions on Google Chrome, which provides the largest number of extensions. In our collected data set containing 91,147 extensions, we can detect the existence of 17.68% extensions. Finally, the superiority of NEEX is proved through comparative experiments with existing 作者: 漫步 時(shí)間: 2025-3-26 13:35
,Granularity and?Usability in?Authorization Policies,stion is important because a trend in the design of such policy languages in real systems over the years has been to enrich the set of actions. For a meaningful comparison between the two extremes, we design an overlay authorization policy syntax for AWS that allows the three actions read, write and作者: 心神不寧 時(shí)間: 2025-3-26 19:43
SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures,, in our review, we also provide a detailed analysis of the suggested mitigating measures, which include removing, repairing, or deleting access to devices that are no longer in use, utilizing Personal Identification Number (PIN) for user authentication, and other solutions. Thereafter, we conclude 作者: stress-test 時(shí)間: 2025-3-26 21:19
,JSLIM: Reducing the?Known Vulnerabilities of?JavaScript Application by?Debloating,ding to the generated function call graph, determine whether the program calls the method that generates the vulnerability in the dependent library. JSLIM removes the code that isn’t called by the program and uses the sandbox to isolate the code that has vulnerabilities but cannot be removed. We con作者: 正式通知 時(shí)間: 2025-3-27 04:56 作者: 河潭 時(shí)間: 2025-3-27 06:31 作者: 凝乳 時(shí)間: 2025-3-27 10:36 作者: zonules 時(shí)間: 2025-3-27 14:54 作者: 發(fā)電機(jī) 時(shí)間: 2025-3-27 20:33
,Keine Zeit für ?Business as usual“,ding to the generated function call graph, determine whether the program calls the method that generates the vulnerability in the dependent library. JSLIM removes the code that isn’t called by the program and uses the sandbox to isolate the code that has vulnerabilities but cannot be removed. We con作者: cipher 時(shí)間: 2025-3-27 23:57
Wertebildung als Bestandteil einer BBNE,tion of 2D image processing and 3D depth-sensing technologies results in a system that can monitor a physical space where entities come into proximity to one another. Furthermore, the system can be used to prevent transgressions between physical entities within a relative distance of a few centimetr作者: 積習(xí)已深 時(shí)間: 2025-3-28 04:25 作者: indicate 時(shí)間: 2025-3-28 06:23
Nachhaltigkeit als radikaler Wandelandomization, etc. While improving user browsing experience, it also provides a new idea for web tracking. In recent years, researchers have proposed browser extension fingerprinting, which uniquely identifies a user by obtaining the list of browser extensions user-installed to realize user tracking作者: ANTIC 時(shí)間: 2025-3-28 13:01
,Rechtliches Umfeld für Nachhaltigkeit,larly important. Then, the health QR code has been designed to tracing and controlling the epidemic. Through the health code, the confirmed cases and close contacts will be traced quickly. However, the health code records a great deal of residents’ privacy information and if it is leaked, the conseq作者: thrombosis 時(shí)間: 2025-3-28 14:58 作者: ethereal 時(shí)間: 2025-3-28 21:45
https://doi.org/10.34157/978-3-648-17505-7ich are used to limit the actions a principal may exercise on a resource. We compare two designs from the standpoint of the ease with which such policies can be devised and expressed. The two designs we consider are read-write-execute policies in UNIX, which was designed many decades ago, and identi作者: 手工藝品 時(shí)間: 2025-3-29 01:21
Industrielle Entwicklungsphasenvices and shared with third-parties, users’ privacy concerns may vary. In this paper, we describe our detailed analysis of a two-fold user study with (1) 70 students from our institution and (2) 164 Amazon Mechanical Turk workers to understand how users perceive sensitivity level of different inform作者: Mingle 時(shí)間: 2025-3-29 06:10 作者: hemophilia 時(shí)間: 2025-3-29 10:03 作者: AMBI 時(shí)間: 2025-3-29 11:52 作者: DEAWL 時(shí)間: 2025-3-29 17:18
Nachhaltigkeit im Beschaffungsmanagements ignore the fact that software in modern IT systems is multithreaded so that different system calls may belong to different threads and users. In this work, we show that anomaly detection algorithms can be improved by considering thread information. For this purpose, we extend seven algorithms and 作者: 馬具 時(shí)間: 2025-3-29 23:25 作者: 繞著哥哥問 時(shí)間: 2025-3-30 01:17 作者: larder 時(shí)間: 2025-3-30 06:53 作者: 陳腐思想 時(shí)間: 2025-3-30 12:06