標(biāo)題: Titlebook: Information Security and Privacy Research; 27th IFIP TC 11 Info Dimitris Gritzalis,Steven Furnell,Marianthi Theoha Conference proceedings 2 [打印本頁] 作者: PED 時(shí)間: 2025-3-21 16:07
書目名稱Information Security and Privacy Research影響因子(影響力)
書目名稱Information Security and Privacy Research影響因子(影響力)學(xué)科排名
書目名稱Information Security and Privacy Research網(wǎng)絡(luò)公開度
書目名稱Information Security and Privacy Research網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Privacy Research被引頻次
書目名稱Information Security and Privacy Research被引頻次學(xué)科排名
書目名稱Information Security and Privacy Research年度引用
書目名稱Information Security and Privacy Research年度引用學(xué)科排名
書目名稱Information Security and Privacy Research讀者反饋
書目名稱Information Security and Privacy Research讀者反饋學(xué)科排名
作者: 使入迷 時(shí)間: 2025-3-21 21:01 作者: HUMP 時(shí)間: 2025-3-22 04:11 作者: 同謀 時(shí)間: 2025-3-22 08:08
HIDE_DHCP: Covert Communications through Network Configuration Messagesalysis we observe several features that can be effectively exploited for subliminal data transmission. This results in the implementation of HIDE_DHCP, which integrates three covert channels that accommodate to different stealthiness and bandwidth requirements.作者: Interstellar 時(shí)間: 2025-3-22 10:48 作者: negotiable 時(shí)間: 2025-3-22 13:55
Malicious Users’ Transactions: Tackling Insider Threatechanism to monitor suspicious insiders’ activities and potential harm to the database. With the help of the Predictive DependencyGraphs, the presented model predicts and prevents potential damage caused by malicious transactions.作者: harangue 時(shí)間: 2025-3-22 20:56 作者: Type-1-Diabetes 時(shí)間: 2025-3-22 21:59
Embedded Eavesdropping on Java Cardt injection, is achievable in practice on the latest release of the Java Card specifications by presenting several case studies taking advantage for instance of the well-known GlobalPlatform and (U)SIM Application ToolKit.作者: Palpable 時(shí)間: 2025-3-23 02:43 作者: GIDDY 時(shí)間: 2025-3-23 06:35 作者: 比賽用背帶 時(shí)間: 2025-3-23 11:00
Improving Flask Implementation Using Hardware Assisted In-VM Isolation strongly isolated address space with respect to its associated guest OS, and therefore can provide a trustworthy and centralized repository for policy and decision-making. Our experiment shows that our method introduces moderate performance overhead.作者: 窗簾等 時(shí)間: 2025-3-23 17:01
Relay Attacks on Secure Element-Enabled Mobile Devicesacker no longer needs physical proximity to the phone. Instead, simple relay software needs to be distributed to victims’ mobile devices. This publication describes this relay attack scenario in detail and assesses its feasibility based on measurement results.作者: Abduct 時(shí)間: 2025-3-23 19:02
Smart OpenID: A Smart Card Based OpenID Protocolecurity properties, and generally improves the security of OpenID by avoiding the need to send user credentials over the Internet and thus avoid phishing attacks. We also describe our implementation of the Smart OpenID protocol based on an Android phone, which interacts with OpenID-enabled web services.作者: metropolitan 時(shí)間: 2025-3-23 22:34
Peer to Peer Botnet Detection Based on Flow Intervalstwo popular classification techniques with respect to this data. Using existing datasets, we show experimentally that it is possible to identify the presence of botnet activity with high accuracy even with very small time windows, though there are some limitations to the approach based on the selection of attributes.作者: CAND 時(shí)間: 2025-3-24 04:39 作者: 死亡率 時(shí)間: 2025-3-24 09:15 作者: dainty 時(shí)間: 2025-3-24 10:49
A Framework for Threat Assessment in Access Control Systemsroperties that are to be satisfied within each approach. Each of these approaches results in different threat orderings, and can be chosen based on the context of applications or preference of organizations.作者: 違反 時(shí)間: 2025-3-24 18:31 作者: cylinder 時(shí)間: 2025-3-24 19:15
Privacy-Preserving Television Audience Measurement Using Smart TVsdividuals is preserved and that the computed results are valid. Additionally, participants can be compensated for sharing their information. Preliminary experimental results on an Android-based Smart TV platform show the viability of the approach.作者: periodontitis 時(shí)間: 2025-3-25 01:23
978-3-642-44892-8IFIP International Federation for Information Processing 2012作者: 你敢命令 時(shí)間: 2025-3-25 04:35
Information Security and Privacy Research978-3-642-30436-1Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: Interim 時(shí)間: 2025-3-25 09:28
https://doi.org/10.1007/978-3-642-30436-1Web authentication; botnet; cryptanalysis; phishing; smart cards; algorithm analysis and problem complexi作者: falsehood 時(shí)間: 2025-3-25 12:28 作者: 手段 時(shí)間: 2025-3-25 16:49 作者: 欲望 時(shí)間: 2025-3-25 20:25
Dimitris Gritzalis,Steven Furnell,Marianthi TheohaState-of-the-art research.Fast-track conference proceedings.Unique visibility作者: 群居男女 時(shí)間: 2025-3-26 00:53
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/i/image/465432.jpg作者: 詼諧 時(shí)間: 2025-3-26 08:11 作者: follicular-unit 時(shí)間: 2025-3-26 09:33
Michael Roland,Josef Langer,Josef Scharingerthe participation of all stakeholders. Usually, designers focus on arranging methods and tools to support participants’ ideation and expression trying to overcome the barriers resulting from differences in background, skills, attitudes, and expertise (Sanders and Stappers .). However, acting as faci作者: Mercurial 時(shí)間: 2025-3-26 12:54
Alessandro Armando,Alessio Merlo,Mauro Migliardi,Luca Verderameherefore, the potential of eye movement-based interaction in VR is far from being realized. In addition, many scholars tried to define some special eye movements as input instructions, but these definitions are almost always empirical and neglect users’ habits and cultural background. In this paper,作者: 歡笑 時(shí)間: 2025-3-26 19:20
Bernhard J. Berger,Karsten Sohr. The Chinese community is one of the most important foreign groups in Milan, with notable involvement of the community members in the restaurant business. The aim of the research is investigating design potentials for cross-cultural environments and scenarios. We focus on Chino-Italian services in 作者: figurine 時(shí)間: 2025-3-26 23:13
Guillaume Barbu,Christophe Giraud,Vincent Gueriny childhood. Toys have become an important growth partner for children nowadays. Can the children be satisfied from the selective purchase behavior led by parents? Whether the parents’ selection is consistent with the children’s expectation becomes a topic for discussion. This research is one of the作者: 濕潤 時(shí)間: 2025-3-27 04:42 作者: goodwill 時(shí)間: 2025-3-27 07:12
Alexandre B. Augusto,Manuel Eduardo Correiaover the world. The intelligence of vehicles also puts forward higher requirements for the icon design of the in-vehicle display screens. Based on relevant research results at home and abroad, based on user experience and user needs, this paper adopted the case study method, used 24 icons for differ作者: ERUPT 時(shí)間: 2025-3-27 10:49 作者: arrogant 時(shí)間: 2025-3-27 17:41 作者: rectum 時(shí)間: 2025-3-27 19:39
Eleni Gessiou,Vasilis Pappas,Elias Athanasopoulos,Angelos D. Keromytis,Sotiris Ioannidist Industrial Revolution toward “Mechanization” (Industry 1.0) and its subsequent second one toward “Electrification” (Industry 2.0) to the third Industrial Revolution toward “Digitization” (Industry 3.0). Product design accompanied by the industrial and technological developments has also evolved fr作者: 背信 時(shí)間: 2025-3-28 01:04 作者: 友好關(guān)系 時(shí)間: 2025-3-28 03:26 作者: crockery 時(shí)間: 2025-3-28 06:32
Feifei Wang,Ping Chen,Bing Mao,Li Xieof Non-proliferation Treaty (NPT), ..). None of the nine possessors of nuclear weapons: USA, Russia, Britain, China, France, India, Pakistan, North Korea and Israel—did participate in the negotiations on the text of the Treaty and vote. Japan, the main victim of nuclear weapons, and non-nuclear weap作者: 離開 時(shí)間: 2025-3-28 11:05 作者: Abominate 時(shí)間: 2025-3-28 18:27 作者: 對(duì)手 時(shí)間: 2025-3-28 20:23 作者: 偽造者 時(shí)間: 2025-3-28 23:27 作者: CAPE 時(shí)間: 2025-3-29 05:35 作者: LEVY 時(shí)間: 2025-3-29 09:53
Weihan Li,Brajendra Panda,Qussai Yaseend linguistic diversity. After the democratic transition in 1989/90, the country’s new legislation on the protection of minorities became generally praised as standard setting in Europe. In 2011 a new Constitution and a new law on minorities were adopted, one of the major ‘innovations’ being Hungaria作者: 使增至最大 時(shí)間: 2025-3-29 14:50 作者: LEVER 時(shí)間: 2025-3-29 18:50 作者: 客觀 時(shí)間: 2025-3-29 21:25
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasurese totally unresponsive. We discuss the characteristics of the vulnerability – which affects all versions of Android – and propose two different fixes, each involving little patching implementing a few architectural countermeasures. We also provide experimental evidence of the effectiveness of the ex作者: Hyperopia 時(shí)間: 2025-3-30 01:02 作者: Urgency 時(shí)間: 2025-3-30 06:08
Embedded Eavesdropping on Java Cardrm and of the hosted applications as well as the privacy of the cardholder. We show that such an attack, which combines malicious application and fault injection, is achievable in practice on the latest release of the Java Card specifications by presenting several case studies taking advantage for i作者: Cervical-Spine 時(shí)間: 2025-3-30 10:30 作者: troponins 時(shí)間: 2025-3-30 13:31 作者: 合唱團(tuán) 時(shí)間: 2025-3-30 17:44 作者: freight 時(shí)間: 2025-3-30 23:08
Peer to Peer Botnet Detection Based on Flow Intervalsuals. Botnets have been used in a variety of cybercrime, from click-fraud to DDOS attacks to the generation of spam. In this paper we propose an approach to detect botnet activity by classifying network traffic behavior using machine learning classification techniques. We study the feasibility of de作者: GONG 時(shí)間: 2025-3-31 01:36
Towards a Universal Data Provenance Framework Using Dynamic Instrumentation, or the creation of architectures that are built from the ground up with provenance capabilities. In this paper we propose a universal data provenance framework, using dynamic instrumentation, which gathers data provenance information for real-world applications without any code modifications. Our 作者: cognizant 時(shí)間: 2025-3-31 06:06
Improving Flask Implementation Using Hardware Assisted In-VM Isolationerating system.?In nature, OM and SS should be isolated from each other to separate decision from enforcement. However, current implementation of Flask, such as SELinux and SEBSD, puts both OM and SS in the same address space. If one component is subverted, the whole system will be exposed to the at作者: 稀釋前 時(shí)間: 2025-3-31 11:01 作者: Abduct 時(shí)間: 2025-3-31 16:22 作者: Cardiac 時(shí)間: 2025-3-31 17:41 作者: GRIEF 時(shí)間: 2025-3-31 23:52