派博傳思國際中心

標(biāo)題: Titlebook: Risks and Security of Internet and Systems; 15th International C Joaquin Garcia-Alfaro,Jean Leneutre,Reda Yaich Conference proceedings 2021 [打印本頁]

作者: 聯(lián)系    時間: 2025-3-21 16:57
書目名稱Risks and Security of Internet and Systems影響因子(影響力)




書目名稱Risks and Security of Internet and Systems影響因子(影響力)學(xué)科排名




書目名稱Risks and Security of Internet and Systems網(wǎng)絡(luò)公開度




書目名稱Risks and Security of Internet and Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Risks and Security of Internet and Systems被引頻次




書目名稱Risks and Security of Internet and Systems被引頻次學(xué)科排名




書目名稱Risks and Security of Internet and Systems年度引用




書目名稱Risks and Security of Internet and Systems年度引用學(xué)科排名




書目名稱Risks and Security of Internet and Systems讀者反饋




書目名稱Risks and Security of Internet and Systems讀者反饋學(xué)科排名





作者: 連鎖,連串    時間: 2025-3-21 20:49

作者: anthropologist    時間: 2025-3-22 04:09
Ouissem Ben Fredj,Omar Cheikhrouhou,Moez Krichen,Habib Hamam,Abdelouahid Derhabent of sustainable technology; human-robot interaction; information visualization; interactive design and cultural development.. Part IV: interaction techniques978-3-030-85606-9978-3-030-85607-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: arcane    時間: 2025-3-22 08:22

作者: climax    時間: 2025-3-22 08:47
Measuring and Modeling Software Vulnerability Security Advisory Platformsposed model and the collected data, we assess how different system parameters, such as the delays incurred by each platform to propagate its messages, impact the overall flow of information across platforms.
作者: 載貨清單    時間: 2025-3-22 15:00

作者: 充滿人    時間: 2025-3-22 19:43
Security Through Transparency and Openness in Computer Designor security, transparency is a key sociotechnical requirement which lies at the core of trust in computing. As one of the most important abstractions interfacing the hardware and the lowest level software, the instruction set architecture (ISA) is perhaps the most essential element in the path to tr
作者: 敲竹杠    時間: 2025-3-23 00:16
Heterogeneous Security Events Prioritization Using Auto-encoderse information of the difference between normal learned events and the events actually produced by the monitoring system. Additionally, the auto-encoders also provide a way to regroup similar events via clustering.
作者: immunity    時間: 2025-3-23 01:23

作者: 阻礙    時間: 2025-3-23 08:17
Modelling Security Risk Scenarios Using Subjective Attack Treeslso discussed. Our approach is evaluated against traditional attack trees using the Stuxnet self-installation scenario. Our results show that taking uncertainty about probabilities into account during security risk analysis can lead to different outcomes, and therefore different security decisions.
作者: 時代錯誤    時間: 2025-3-23 11:48
as: (1) interaction design related; (2) wearable computing related; (3) surroundings and environment related; (4) learner related; (5) context of use; and (6) technical issues. This paper also identifies aspects that relate to methods to be used and applied to such cases for evaluation studies.
作者: liposuction    時間: 2025-3-23 17:18

作者: BOOST    時間: 2025-3-23 18:41
Maurantonio Caprolu,Stefano Cresci,Simone Raponi,Roberto Di PietroN?=?24) and in a hurry situation in a campus building (N?=?48). Test results show that the proposed solution was highly acceptable and rated good in usability among participants. The effectiveness as reaching the target destination was excellent and the efficiency measured as time increased only mod
作者: 沉積物    時間: 2025-3-24 00:00
s a medium of exchange for energy? And, to what extent is full-automation desirable?.To shed light on these and related questions, we developed and tested ., a decentralized, P2P energy trading platform. In this paper, we report on our findings from interviews with nine families that have used . for
作者: keloid    時間: 2025-3-24 03:18
Lucas Miranda,Daniel Vieira,Mateus Nogueira,Leonardo Ventura,Miguel Bicudo,Matheus Martins,Lucas Sens. We tested the IVR probe with fifty-seven of the original scoping participants which validated the knowledge transferred by the IVR and its acceptability. Invisible design videos were shown to elaborate the IVR and community concept to thirteen participants through two filmed videos using our exis
作者: 膽大    時間: 2025-3-24 07:43

作者: 喃喃而言    時間: 2025-3-24 11:43
Mohamed Amine Merzouk,Frédéric Cuppens,Nora Boulahia-Cuppens,Reda Yaichr tablet-based input vs paper, identification of case-specific accessibility issues and situational impairment, benefits of self-completed digital data collection in overcoming such issues and promoting patient independence and privacy, with considerations for maintaining perceived value and engagem
作者: Nmda-Receptor    時間: 2025-3-24 17:35

作者: 雕鏤    時間: 2025-3-24 20:12
Olivier Levillainositively affected people’s perception of social robots, as companions, and that the feeling of loneliness can drive the purchase of a social robot. The second study replicated the results of the first study. We also discuss the effects of Big 5 personality traits on the likelihood to purchase a soc
作者: 吞吞吐吐    時間: 2025-3-25 02:54

作者: Ordeal    時間: 2025-3-25 03:27
Noureddine Amraoui,Belhassen Zouaried to acquire physiological signals, such as heart rate and respiratory rate. Analysis results of these signals can support a user to make a decision for taking actions or to make an automatic system undertake certain strategies to counteract the sources of stress. These technologies can be designed
作者: 和平    時間: 2025-3-25 11:10

作者: 極微小    時間: 2025-3-25 13:05
Farah Dernaika,Nora Cuppens-Boulahia,Frédéric Cuppens,Olivier Raynaudt of the population. In this sense, the aspects related to human-machine interaction are of paramount relevance for the diffusion of these solutions..This article presents a mobile device application based on artificial intelligence tools for the early diagnosis and monitoring of patients suffering
作者: BYRE    時間: 2025-3-25 18:20

作者: 尖    時間: 2025-3-25 23:20
Fabien Patrick Viertel,Wasja Brunotte,Yannick Evers,Kurt Schneidersidered a valid metric when researchers would like to compare several task conditions in realistic user interfaces in which error operations induce different recovery times. However, because the model fitness using the effective width method was comparatively low when the penalty time was 0?s, compa
作者: 易于交談    時間: 2025-3-26 03:17
hat callers expect artificial conversational agents to process. These expectations affect the way the enquiry is formulated and, as a result, operators and artificial agents encounter different types of problems they have to repair to understand the question correctly and find an answer to it. Our f
作者: 運(yùn)動的我    時間: 2025-3-26 06:52
Julien Bringer,Hervé Chabanne,Linda Guigarded, transcribed, and analyzed with a two-stage thematic analysis, yielding in the end 76.8% inter-coders’ agreement..We identified six roles of PA, i.e., guide, interlocutor, safe box, lifesaver, secretary, and travel mate. We also break down the frequency with which each role is mentioned by the
作者: flaunt    時間: 2025-3-26 09:44

作者: 懶洋洋    時間: 2025-3-26 14:33
Measuring and Modeling Software Vulnerability Security Advisory Platformslities. The data is curated so as to extract dates from each of the analyzed security advisories. The resulting time series are our object of study. From our measurements we were able to identify which role was assumed by different platforms (such as websites and forums) in the security landscape, i
作者: 不成比例    時間: 2025-3-26 17:02
Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESsessors and are considered more secure. However, they are subject to a new type of attack, known as relay attack. Due to this attack, hundreds of cars have been stolen in many countries. Since then, car manufacturers as well as insurance companies have been experiencing an endless nightmare. Research
作者: INERT    時間: 2025-3-26 23:15
A Deeper Analysis of Adversarial Examples in Intrusion Detection for intrusion detection. However, and despite the progress made in this area, machine learning models have been found to be vulnerable to slightly modified data samples called adversarial examples. Thereby, a small and well-computed perturbation may allow adversaries to evade intrusion detection sy
作者: opportune    時間: 2025-3-27 02:23
Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefitsws affecting a wide range of independent stacks. The infamous Heartbleed bug, was estimated to affect more than 20% of the most popular HTTPS servers. We propose a structured review of these implementation flaws. By considering their consequences but also their root causes, we present some lessons l
作者: etidronate    時間: 2025-3-27 07:23
Security Through Transparency and Openness in Computer Designn cybersecurity updates of the software and firmware running on their devices to keep their privacy and data protected from malicious use. Businesses and governments procure technology which they expect to run for long periods and be kept in line with the state of the art in security. Presently, how
作者: 跟隨    時間: 2025-3-27 11:50
An ML Behavior-Based Security Control for Smart Home Systemsy applications (called SmartApps). However, intentional/unintentional issues would make SmartApps deviate from their expected behavior, putting the SHS owner’s security at risk. To address this issue, in this paper, we introduce an ML behavior-based approach to prevent malicious control of SHS devic
作者: Blood-Vessels    時間: 2025-3-27 15:28

作者: 出價    時間: 2025-3-27 19:58

作者: 慢慢流出    時間: 2025-3-27 22:11

作者: 按等級    時間: 2025-3-28 02:12

作者: 豎琴    時間: 2025-3-28 09:03

作者: maverick    時間: 2025-3-28 14:00
Premium Access to Convolutional Neural Networksvileged users. Our solution relies on a degraded implementation which can be corrected thanks to a PIN. We explain how to select a few parameters in an NN so as to maximize the gap in the accuracy between the premium and the degraded modes. We report experiments on an implementation of our proposal
作者: 同來核對    時間: 2025-3-28 16:01
An OWASP Top Ten Driven Survey on Web Application Protection Methodsacing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The a
作者: 名次后綴    時間: 2025-3-28 20:35
A Posteriori Analysis of Policy Temporal Compliancevalues may evolve over time. Therefore, we propose a verification mechanism of policy temporal compliance, based on SWRL and Event Calculus, to check if the required attributes were respected at the appropriate time.
作者: 憤憤不平    時間: 2025-3-29 00:30
Conference proceedings 2021lace during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. ..The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, th
作者: Original    時間: 2025-3-29 06:36
Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits We propose a structured review of these implementation flaws. By considering their consequences but also their root causes, we present some lessons learned or yet to be learned. We also assess the impact of TLS?1.3, the latest version of the protocol, on the security of SSL/TLS implementations.
作者: yohimbine    時間: 2025-3-29 11:15
An OWASP Top Ten Driven Survey on Web Application Protection Methods This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The application of these countermeasures will guarantee the protection of the WAs against the most severe attacks and prevent several unknown exploits.
作者: 現(xiàn)暈光    時間: 2025-3-29 14:41

作者: 過于平凡    時間: 2025-3-29 16:13
Conference proceedings 2021etection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection. .
作者: Orgasm    時間: 2025-3-29 19:45
0302-9743 ntrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection. .978-3-030-68886-8978-3-030-68887-5Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: Ringworm    時間: 2025-3-30 01:40

作者: 箴言    時間: 2025-3-30 04:43

作者: 使殘廢    時間: 2025-3-30 10:33
Asset-Driven Approach for Security Risk Assessment in IoT Systems the list of threats, we define the security objectives then technical requirements and countermeasures that can cover these objectives. We apply our approach to an IoT system for monitoring and control the management of the urban water cycle.
作者: FELON    時間: 2025-3-30 16:06
ese challenges were drawn out based on a user study that was carried out to evaluate a mobile application prototype, SmartC. SmartC was designed for supporting people in taking learning opportunities at sites whenever they need informally while they are on the move. Augmented reality and wearable co
作者: 憤慨點(diǎn)吧    時間: 2025-3-30 18:48
collaboration are not as previously imagined. In this paper, we introduce the concept of ., a technique based on a simple and intuitive user interface, and in an efficient and low cost algorithm that finds the matching between two images. The user interface guides the photographer to position the ca
作者: Circumscribe    時間: 2025-3-30 20:50

作者: JOT    時間: 2025-3-31 01:44
er-to-Peer (P2P) energy trading. Several proof-of-concept and pilot projects are running all over the world to test this specific use case. However, despite much work addressing the technical and regulatory aspects related to DLT for P2P energy trading, our understanding of the human aspects affecti




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平远县| 杭州市| 逊克县| 栖霞市| 济源市| 广丰县| 恩平市| 陆川县| 江源县| 东乌| 阿拉善右旗| 桐柏县| 白朗县| 庄浪县| 中牟县| 九江市| 佛山市| 石河子市| 浏阳市| 曲靖市| 如东县| 广饶县| 曲沃县| 中方县| 怀仁县| 惠来县| 阳高县| 青铜峡市| 石嘴山市| 铁岭市| 吉安县| 渭南市| 梅州市| 铁岭县| 雅江县| 新昌县| 称多县| 湖南省| 定结县| 武宁县| 沁阳市|