找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Technology - New Generations; 15th International C Shahram Latifi Conference proceedings 2018 Springer International Publishing

[復制鏈接]
樓主: EFFCT
31#
發(fā)表于 2025-3-26 23:45:27 | 只看該作者
Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Featuresclassify samples with similar characteristics into families makes possible to create mitigation strategies that work for a whole class of programs. In this paper, we present a malware family classification approach using VGG16 deep neural network’s bottleneck features. Malware samples are represente
32#
發(fā)表于 2025-3-27 04:49:03 | 只看該作者
33#
發(fā)表于 2025-3-27 05:49:23 | 只看該作者
A Self Proxy Signature Scheme Over NTRU Latticesiginal keys by generating temporary key pairs for a time period and then revoke them. The temporary keys can be generated by delegating the signing right to himself. Thus, in SPS the user can prevent the exposure of his private key from repeated use. If we are considering the existence of quantum co
34#
發(fā)表于 2025-3-27 11:01:37 | 只看該作者
Towards an Ontology of Security Assessment: A Core Model Proposal given that there is an overlap of the “Information Security” and “Systems Assessment” areas, concepts are ambiguous, terminology is confounding, and important concepts are not defined. Nineteen papers on ontology, out of 80 papers of interest, have been selected to be discussed. Most of them are pr
35#
發(fā)表于 2025-3-27 14:54:30 | 只看該作者
Integration of Mobile Forensic Tool Capabilitiess tools provide important capabilities for digital forensic investigators to extract, examine, and analyze evidence data uncovered from mobile devices. Due to the limitations of various tools, this paper argues for an integrated approach to mobile forensic tool capabilities through combined use of d
36#
發(fā)表于 2025-3-27 18:18:53 | 只看該作者
37#
發(fā)表于 2025-3-27 23:42:41 | 只看該作者
38#
發(fā)表于 2025-3-28 03:56:34 | 只看該作者
39#
發(fā)表于 2025-3-28 08:24:24 | 只看該作者
40#
發(fā)表于 2025-3-28 12:14:15 | 只看該作者
Cloud Intrusion Detection and Prevention System for M-Voting Application in South Africa: Suricata v one of the technologies that has emerged. One of the subsets of e-voting is mobile voting. Mobile voting is the use of mobile phones to cast a vote outside the restricted electoral boundaries. Mobile phones are pervasive; they offer connection anywhere, at any time. However, utilising a fast-growin
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 07:22
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
扎赉特旗| 连云港市| 吴江市| 犍为县| 府谷县| 临沭县| 乐安县| 璧山县| 峨山| 宾阳县| 九台市| 蓬莱市| 福建省| 浦东新区| 固始县| 宣恩县| 泰州市| 苏尼特左旗| 辰溪县| 纳雍县| 阿巴嘎旗| 营口市| 马鞍山市| 九江县| 滨海县| 长乐市| 望谟县| 峨眉山市| 宜黄县| 阿尔山市| 北安市| 贺兰县| 泰安市| 祁东县| 邢台市| 桦甸市| 兴和县| 吉林省| 耿马| 杂多县| 太谷县|