找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Research in Attacks, Intrusions and Defenses; 15th International S Davide Balzarotti,Salvatore J. Stolfo,Marco Cova Conference proceedings

[復(fù)制鏈接]
樓主: Combat
31#
發(fā)表于 2025-3-27 00:57:16 | 只看該作者
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve ., and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.
32#
發(fā)表于 2025-3-27 02:26:10 | 只看該作者
33#
發(fā)表于 2025-3-27 07:15:58 | 只看該作者
Proactive Discovery of Phishing Related Domain Nameshing related activities - “secure”, “banking”, brand names, etc. Once a pro-active blacklist is created, ongoing and daily monitoring of only these domains can lead to the efficient detection of phishing web sites.
34#
發(fā)表于 2025-3-27 13:28:17 | 只看該作者
DEMACRO: Defense against Malicious Cross-Domain Requestsects potentially malicious cross-domain requests and de-authenticates them by removing existing session credentials. Our system requires no training or user interaction and imposes minimal performance overhead on the user’s browser.
35#
發(fā)表于 2025-3-27 17:19:22 | 只看該作者
FlashDetect: ActionScript 3 Malware Detectiont?3. . classifies submitted files using a naive Bayesian classifier based on a set of predefined features. Our experiments show that . has high classification accuracy, and that its efficacy is comparable with that of commercial anti-virus products.
36#
發(fā)表于 2025-3-27 20:15:07 | 只看該作者
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols n-gram analysis on real-life environments. Our tests show that the analyzed systems, in presence of data with high variability, cannot deliver high detection and low false positive rates at the same time.
37#
發(fā)表于 2025-3-28 01:21:33 | 只看該作者
38#
發(fā)表于 2025-3-28 02:32:45 | 只看該作者
39#
發(fā)表于 2025-3-28 07:21:32 | 只看該作者
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)bedding support for their local languages and using a larger set of phrases. Similarly, uploading a photo of valuable items on social networks can also incentivize crime. Moreover, sleeping and drinking patterns identified from uploads, can help criminals in planning their crime execution hours.
40#
發(fā)表于 2025-3-28 11:02:51 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 15:25
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
堆龙德庆县| 澳门| 镇安县| 福安市| 兴宁市| 赤水市| 梨树县| 新乡县| 江都市| 溧水县| 布拖县| 永修县| 乌什县| 广水市| 达拉特旗| 乌兰县| 贵溪市| 华阴市| 临武县| 黄浦区| 玛多县| 虹口区| 梨树县| 庐江县| 县级市| 东至县| 常宁市| 南宫市| 松江区| 平度市| 延长县| 峨眉山市| 赤城县| 乌拉特中旗| 芦山县| 金阳县| 雷州市| 东安县| 阿城市| 纳雍县| 宝鸡市|