標題: Titlebook: Global Security, Safety, and Sustainability; 7th International an Christos K. Georgiadis,Hamid Jahankhani,Ameer Al-N Conference proceedings [打印本頁] 作者: bankrupt 時間: 2025-3-21 19:17
書目名稱Global Security, Safety, and Sustainability影響因子(影響力)
書目名稱Global Security, Safety, and Sustainability影響因子(影響力)學科排名
書目名稱Global Security, Safety, and Sustainability網(wǎng)絡公開度
書目名稱Global Security, Safety, and Sustainability網(wǎng)絡公開度學科排名
書目名稱Global Security, Safety, and Sustainability被引頻次
書目名稱Global Security, Safety, and Sustainability被引頻次學科排名
書目名稱Global Security, Safety, and Sustainability年度引用
書目名稱Global Security, Safety, and Sustainability年度引用學科排名
書目名稱Global Security, Safety, and Sustainability讀者反饋
書目名稱Global Security, Safety, and Sustainability讀者反饋學科排名
作者: Biomarker 時間: 2025-3-22 00:03 作者: BRAVE 時間: 2025-3-22 02:08 作者: Hyperopia 時間: 2025-3-22 04:57 作者: 直覺好 時間: 2025-3-22 10:40
978-3-642-33447-4ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012作者: 增減字母法 時間: 2025-3-22 13:42
Global Security, Safety, and Sustainability978-3-642-33448-1Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 增減字母法 時間: 2025-3-22 20:22
Christos K. Georgiadis,Hamid Jahankhani,Ameer Al-NFast conference proceedings.State-of-the-art report.Up to date results作者: cornucopia 時間: 2025-3-23 00:44 作者: CLEFT 時間: 2025-3-23 01:54 作者: detach 時間: 2025-3-23 06:03
Unit Testing Persistence Layers,t necessarily in need of the generated contextual stream. IPAC mainly targets embedded devices such as OS-powered sensor motes, smartphones and PDAs. The platform relies on the OSGi framework (a popular middleware for embedded devices) for component deployment, management and execution. We discuss i作者: 遭遇 時間: 2025-3-23 12:11 作者: strain 時間: 2025-3-23 15:58 作者: conception 時間: 2025-3-23 20:11 作者: 輕而薄 時間: 2025-3-24 02:15 作者: 厚臉皮 時間: 2025-3-24 03:10 作者: 直言不諱 時間: 2025-3-24 07:41 作者: 陰險 時間: 2025-3-24 12:01
Practical Password Harvesting from Volatile Memory,itched off but not removed from the mains, the data are preserved. In fact, when a process is terminated but the computer is still operating, the respective data are more likely to be lost. Therefore capturing the memory could be as critical on a switched off system as on a running one.作者: ALLEY 時間: 2025-3-24 17:29
On the Evolution of Malware Species,n of monophyletic clusters. In this paper, using public available data, we demonstrate the departure of the democratic virus writing model in which even moderate programmers managed to create successful virus strains to an entirely aristocratic ecosystem of highly evolved malcode.作者: Trypsin 時間: 2025-3-24 22:23 作者: 錢財 時間: 2025-3-24 23:14
Wait Strategies in Selenium Test Automation, allows remote access to the legacy application, providing it with encrypted communications and strongly authenticated access control but without requiring any modifications to the underlying application.作者: 燈絲 時間: 2025-3-25 05:52
Java Threads and the Concurrency Utilities the aid of a shared key encryption algorithm. These protocols do not require previous pre-distribution of candidate keys or some other piece of information of specialized form except a small seed value, from which the two entities can produce arbitrarily long strings with many similarities.作者: nonradioactive 時間: 2025-3-25 11:12
Transforming XML Documents with XSLTuirements of such an authentication mechanism correlate to the characteristics of the deployed e-passport infrastructure. Finally, this paper proposes leveraging the e-passport infrastructure, to build a secure cross border authentication mechanism.作者: Biguanides 時間: 2025-3-25 12:46
Joachim Goll,Cornelia Wei?,Peter Rothl?nderask. These results suggest that using EEG recording alone, a unique signature can be acquired in real-time which provides significant and suggestive evidence that the user is not merely typing – that they may be trying to crack into the system.作者: Jacket 時間: 2025-3-25 19:45 作者: 全等 時間: 2025-3-25 22:36 作者: 新鮮 時間: 2025-3-26 01:40 作者: grieve 時間: 2025-3-26 08:10
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution, the aid of a shared key encryption algorithm. These protocols do not require previous pre-distribution of candidate keys or some other piece of information of specialized form except a small seed value, from which the two entities can produce arbitrarily long strings with many similarities.作者: 改正 時間: 2025-3-26 11:01 作者: Pander 時間: 2025-3-26 15:43
,In the Hacker’s Eye: The Neurophysiology of a Computer Hacker,ask. These results suggest that using EEG recording alone, a unique signature can be acquired in real-time which provides significant and suggestive evidence that the user is not merely typing – that they may be trying to crack into the system.作者: bonnet 時間: 2025-3-26 16:58
Untangling Public Service Usage for Agribusinesses with Dialogic E-government,rch relevant legislation or various public agency Web sites. The proposed service comprises a new extension of the pilot system Agroportal, and has been based on the methods and tools of a European project.作者: SNEER 時間: 2025-3-26 21:41
On the Deployment of Artificial Immune Systems for Biometrics,operties and their interrelations are described in this paper – which is a prelude to their application in the context of biometrics. It will be demonstrated that the AIS approach is both a natural and potentially very effective approach to providing biometric security within a range of modalities.作者: BIDE 時間: 2025-3-27 03:26 作者: 半導體 時間: 2025-3-27 07:43 作者: 聚集 時間: 2025-3-27 10:15 作者: HERTZ 時間: 2025-3-27 15:49
https://doi.org/10.1007/978-1-4842-3015-2oncepts of cryptography, and that they are not capable of efficiently managing digital certificates. This case study serves as first evidence supporting our hypothesis that user interface design is deteriorating cryptographic solutions effectiveness due to usability issues.作者: 天賦 時間: 2025-3-27 20:39
A Robustness Testing Method for Network Security,nd a new model of Glued-IOLTS (Labelled Transition System) is given for defining this kind of multiple and networked system. Then a new approach and algorithm are given for generating the robustness test cases automatically.作者: Kernel 時間: 2025-3-27 23:44 作者: RAFF 時間: 2025-3-28 04:04 作者: GEN 時間: 2025-3-28 09:35
Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates,oncepts of cryptography, and that they are not capable of efficiently managing digital certificates. This case study serves as first evidence supporting our hypothesis that user interface design is deteriorating cryptographic solutions effectiveness due to usability issues.作者: Fierce 時間: 2025-3-28 12:11 作者: gene-therapy 時間: 2025-3-28 18:10
,First Analysis—From Naive to Flexible,privacy of data subjects data refer to. Furthermore, existing privacy and information loss related metrics are presented, as well as the algorithm implementing the maximum entropy anonymity concept. From a privacy protection perspective, the achieved results are very promising, while the suffered information loss is limited.作者: PHIL 時間: 2025-3-28 22:40 作者: entail 時間: 2025-3-29 02:55
Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining,privacy of data subjects data refer to. Furthermore, existing privacy and information loss related metrics are presented, as well as the algorithm implementing the maximum entropy anonymity concept. From a privacy protection perspective, the achieved results are very promising, while the suffered information loss is limited.作者: legitimate 時間: 2025-3-29 06:36 作者: 搏斗 時間: 2025-3-29 10:12 作者: febrile 時間: 2025-3-29 13:35 作者: 不可比擬 時間: 2025-3-29 15:59
https://doi.org/10.1007/978-1-4842-3441-9n of monophyletic clusters. In this paper, using public available data, we demonstrate the departure of the democratic virus writing model in which even moderate programmers managed to create successful virus strains to an entirely aristocratic ecosystem of highly evolved malcode.作者: doxazosin 時間: 2025-3-29 22:19
Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining,icular, a maximum entropy oriented algorithm to protect sensitive data is proposed. As opposed to .anonymity, ?.diversity and .closeness, the proposed algorithm builds equivalence classes with possibly uniformly distributed sensitive attribute values, probably by means of noise, and having as a lowe作者: 運動的我 時間: 2025-3-30 03:38 作者: Shuttle 時間: 2025-3-30 06:53 作者: Extricate 時間: 2025-3-30 09:51
Tuning the Epidemical Algorithm in Wireless Sensor Networks,ributed applications that rely on infrastructureless (ad-hoc) network with multi-hop transmission capabilities. Such environment is typically used for the realization of collaborative context awareness where nodes with sensors “generate” and report context while other nodes receive and “consume” suc作者: MEEK 時間: 2025-3-30 15:01
A Robustness Testing Method for Network Security,system. The network components like attackers, normal clients and the network devices are modeled as implementations of the testing system. And by evaluating the system’s robustness, the potential design defects can be detected. The methods on robustness testing of multiple components are studied, a作者: employor 時間: 2025-3-30 18:04 作者: cardiopulmonary 時間: 2025-3-31 00:10
On the Evolution of Malware Species,age, unsolicited bulk email (.), piracy and other illicit acts. Despite the steadily increasing number of new malware species, we observe the formation of monophyletic clusters. In this paper, using public available data, we demonstrate the departure of the democratic virus writing model in which ev作者: Cholesterol 時間: 2025-3-31 03:51 作者: 輕率的你 時間: 2025-3-31 07:24 作者: 其他 時間: 2025-3-31 11:18
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution,ructure such as wireless sensor networks (and in general wireless mobile ad-hoc networks). In such networks, nodes establish and terminate communication sessions dynamically with other nodes which may have never been encountered before, in order to somehow exchange information which will enable them作者: 表皮 時間: 2025-3-31 14:10 作者: 轉(zhuǎn)換 時間: 2025-3-31 18:23
Towards Colored Petri Net Modeling of Expanded C-TMAC,re resources. The variety of such systems include a wide range of applications such as collaborative document sharing and editing, social networks, work flow management systems, mobile location based applications etc. As those systems continue to evolve, additional requirements arise which need to b作者: 數(shù)量 時間: 2025-3-31 22:43 作者: 放大 時間: 2025-4-1 04:50
Genre-Based Information Hiding,ndicator that such data is present. Concealing information and hiding the fact that information is hidden are both desirable traits of a confidential data exchange, especially if that exchange takes place across a public network such as the Internet. In the present paper, we describe an approach to