Secure Knowledge Management最新文献

筛选
英文 中文
Learning Password Modification Patterns with Recurrent Neural Networks 用循环神经网络学习密码修改模式
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_7
A. Nosenko, Yuan-Teng Cheng, Haiquan Chen
{"title":"Learning Password Modification Patterns with Recurrent Neural Networks","authors":"A. Nosenko, Yuan-Teng Cheng, Haiquan Chen","doi":"10.1007/978-3-030-97532-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_7","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123395983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android DyPolDroid:保护用户和组织免受Android中的权限滥用攻击
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_2
Carlos E. Rubio-Medrano, M. Hill, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn
{"title":"DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android","authors":"Carlos E. Rubio-Medrano, M. Hill, Luis Claramunt, Jaejong Baek, Gail-Joon Ahn","doi":"10.1007/978-3-030-97532-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_2","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Robustness of Image Based Android Malware Detection Models 基于图像的Android恶意软件检测模型的对抗鲁棒性
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_1
Hemant Rathore, Taeeb Bandwala, S. Sahay, Mohit Sewak
{"title":"Adversarial Robustness of Image Based Android Malware Detection Models","authors":"Hemant Rathore, Taeeb Bandwala, S. Sahay, Mohit Sewak","doi":"10.1007/978-3-030-97532-6_1","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_1","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127094826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Do Fake News Between Different Languages Talk Alike? A Case Study of COVID-19 Related Fake News 不同语言间的假新闻说得一样吗?以COVID-19相关假新闻为例
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_11
Lina Zhou, Jie Tao, E. Lai, Dongsong Zhang
{"title":"Do Fake News Between Different Languages Talk Alike? A Case Study of COVID-19 Related Fake News","authors":"Lina Zhou, Jie Tao, E. Lai, Dongsong Zhang","doi":"10.1007/978-3-030-97532-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_11","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126729725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing CNN Models' Sensitivity to the Ordering of Non-natural Data CNN模型对非自然数据排序的敏感性分析
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_8
Randy Klepetko, R. Krishnan
{"title":"Analyzing CNN Models' Sensitivity to the Ordering of Non-natural Data","authors":"Randy Klepetko, R. Krishnan","doi":"10.1007/978-3-030-97532-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_8","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133820715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution 网络钓鱼邮件检测中的元认知技能:校准和解决方法的研究
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_3
Yuan Li, Jingguo Wang, H. Rao
{"title":"Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution","authors":"Yuan Li, Jingguo Wang, H. Rao","doi":"10.1007/978-3-030-97532-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_3","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114610428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RQ Labs: A Cybersecurity Workforce Talent Program Design RQ实验室:网络安全劳动力人才计划设计
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_10
Clinton Daniel, Matthew T. Mullarkey, M. Agrawal
{"title":"RQ Labs: A Cybersecurity Workforce Talent Program Design","authors":"Clinton Daniel, Matthew T. Mullarkey, M. Agrawal","doi":"10.1007/978-3-030-97532-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_10","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attribute-Based Access Control Policy Review in Permissioned Blockchain 许可区块链中基于属性的访问控制策略审查
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_6
Sherifdeen Lawal, R. Krishnan
{"title":"Attribute-Based Access Control Policy Review in Permissioned Blockchain","authors":"Sherifdeen Lawal, R. Krishnan","doi":"10.1007/978-3-030-97532-6_6","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_6","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132403791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems 网络物理系统中免疫激发异常检测的复杂性处理
Secure Knowledge Management Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-97532-6_9
Lenhard Reuter, Maria Leitner, Philip Smith, Manuel Koschuch
{"title":"Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems","authors":"Lenhard Reuter, Maria Leitner, Philip Smith, Manuel Koschuch","doi":"10.1007/978-3-030-97532-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_9","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信