咨询与建议

限定检索结果

文献类型

  • 74 篇 期刊文献
  • 35 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 110 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 104 篇 工学
    • 95 篇 计算机科学与技术...
    • 49 篇 电气工程
    • 26 篇 软件工程
    • 20 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 网络空间安全
    • 1 篇 交通运输工程
  • 6 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
    • 1 篇 公共管理
  • 5 篇 理学
    • 4 篇 数学
    • 4 篇 系统科学
    • 1 篇 化学
  • 3 篇 法学
    • 2 篇 政治学
    • 1 篇 法学
    • 1 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 1 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 外国语言文学
    • 1 篇 新闻传播学
  • 1 篇 历史学
    • 1 篇 世界史

主题

  • 110 篇 security and pro...
  • 14 篇 security
  • 9 篇 authentication
  • 9 篇 management of co...
  • 7 篇 privacy
  • 6 篇 reliability
  • 6 篇 access control
  • 5 篇 network protocol...
  • 5 篇 distributed syst...
  • 5 篇 biometrics
  • 5 篇 distributed deni...
  • 4 篇 containers
  • 4 篇 risk management
  • 4 篇 information secu...
  • 4 篇 distributed appl...
  • 4 篇 cloud security
  • 4 篇 cloud computing
  • 4 篇 availability
  • 3 篇 intrusion detect...
  • 3 篇 security and pri...

机构

  • 3 篇 princeton univ d...
  • 3 篇 vienna univ tech...
  • 3 篇 texas state univ...
  • 3 篇 cuhk sz sch data...
  • 3 篇 purdue univ dept...
  • 2 篇 huazhong univ sc...
  • 2 篇 nec labs princet...
  • 2 篇 univ padua padua
  • 2 篇 univ calif river...
  • 2 篇 indian inst tech...
  • 2 篇 dga mi bruz
  • 2 篇 graz univ techno...
  • 2 篇 sberbank ad banj...
  • 2 篇 inria rennes
  • 2 篇 univ banja luka ...
  • 2 篇 cent univ rajast...
  • 2 篇 univ banja luka ...
  • 2 篇 purdue univ ceri...
  • 2 篇 supelec rennes
  • 2 篇 malaviya natl in...

作者

  • 5 篇 kumar anmol
  • 5 篇 somani gaurav
  • 3 篇 arora divya
  • 3 篇 li yonggang
  • 3 篇 raghunathan anan...
  • 3 篇 ravi srivaths
  • 3 篇 bao yu
  • 3 篇 lin guoyuan
  • 3 篇 jha niraj k.
  • 2 篇 totel eric
  • 2 篇 zhang yejiang
  • 2 篇 chung yeh-ching
  • 2 篇 majorczyk freder...
  • 2 篇 lu chuiwei
  • 2 篇 furnell steven
  • 2 篇 conti mauro
  • 2 篇 sajic luka
  • 2 篇 godefroy erwan
  • 2 篇 bundalo zlatko
  • 2 篇 karpov alexey

语言

  • 110 篇 英文
检索条件"主题词=Security and Protection"
110 条 记 录,以下是1-10 订阅
排序:
A multi-level DDoS defense mechanism in container based cloud environment
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2025年 第5期28卷 1-19页
作者: Kumar, Anmol Agarwal, Mayank Indian Inst Technol Dept Comp Sci & Engn Patna 801103 Bihar India
DDoS attacks target the victim's service availability. In this paper, we propose a multi-level DDoS defense mechanism that combines two approaches: bandwidth limitation and resource isolation. We consider requests... 详细信息
来源: 评论
Reducing Internal Collateral Damage From DDoS Attacks Through Micro-Service Cloud Architecture
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND security 2025年 20卷 1081-1091页
作者: Kumar, Anmol Agarwal, Mayank Indian Inst Technol Patna Dept Comp Sci & Engn Patna 801103 Bihar India
Mitigating DDoS attacks poses a significant challenge for cyber security teams within victim organizations, as these attacks directly target service availability. Most DDoS mitigation solutions focus address the direc... 详细信息
来源: 评论
Medical Systems Data security and Biometric Authentication in Public Cloud Servers
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING 2024年 第2期12卷 572-582页
作者: Santos, Nelson Ghita, Bogdan Masala, Giovanni Luca Univ Plymouth Sch Engn Comp & Math Plymouth PL4 8AA England Univ Plymouth Ctr Secur Commun & Network Res Plymouth PL4 8AA England Univ Kent Sch Comp Canterbury CT2 7NZ England
Advances in distributed computing and virtualization allowed cloud computing to establish itself as a popular data management and storage option for organizations. However, unclear safeguards, practices, as well as th... 详细信息
来源: 评论
Lore a Red Team Emulation Tool
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2023年 第2期20卷 1596-1608页
作者: Holm, Hannes Swedish Def Res Agcy FOI Dept Informat Secur SE-17290 Stockholm Sweden
This article presents the red team emulation tool Lore, which uses boolean logic and trained models to automatically select and execute red team actions. Lore improves the current state of red team automation, and is ... 详细信息
来源: 评论
Extended Research on the security of Visual Reasoning CAPTCHA
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2023年 第6期20卷 4976-4992页
作者: Wang, Ping Gao, Haichang Xiao, Chenxuan Guo, Xiaoyan Gao, Yipeng Zi, Yang Xidian Univ Sch Comp Sci & Technol Xian 710071 Shaanxi Peoples R China
CAPTCHA is an effective mechanism for protecting computers from malicious bots. With the development of deep learning techniques, current mainstream text-based and traditional image-based CAPTCHAs have been proven to ... 详细信息
来源: 评论
LoMar: A Local Defense Against Poisoning Attack on Federated Learning
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2023年 第1期20卷 437-450页
作者: Li, Xingyu Qu, Zhe Zhao, Shangqing Tang, Bo Lu, Zhuo Liu, Yao Mississippi State Univ Dept Elect & Comp Engn Mississippi State MS 39762 USA Univ S Florida Dept Elect Engn Tampa FL 33620 USA Univ Oklahoma Sch Comp Sci Tulsa OK 74135 USA Univ S Florida Dept Comp Sci & Engn Tampa FL 33620 USA
Federated learning (FL) provides a high efficient decentralized machine learning framework, where the training data remains distributed at remote clients in a network. Though FL enables a privacy-preserving mobile edg... 详细信息
来源: 评论
MagBox: Keep the risk functions running safely in a magic box
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2023年 140卷 282-298页
作者: Li, YongGang Lin, GuoYuan Chung, Yeh-Ching Ma, YaoWen Lu, Yi Bao, Yu China Univ Min & Technol Sch Comp Sci & Technol Xuzhou 221116 Jiangsu Peoples R China CUHK SZ Sch Data Sci Shenzhen 518172 Guangdong Peoples R China
Address space layout randomization (ASLR) has been widely deployed in operating systems (OS) to hide memory layout, which mitigates code reuse attacks (CRAs). Unfortunately, the memory probing techniques can still pro... 详细信息
来源: 评论
A Taxonomy for Python Vulnerabilities
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY
收藏 引用
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY 2024年 第1期5卷 368-379页
作者: Bogaerts, Frederic C. G. Ivaki, Naghmeh Fonseca, Jose Univ Coimbra Dept Informat Engn CISUC DEI P-3004531 Coimbra Portugal Univ Coimbra Polytech Inst Guarda Dept Informat Engn CISUC P-6300559 Guarda Portugal
Python is one of the most widely adopted programming languages, with applications from web development to data science and machine learning. Despite its popularity, Python is susceptible to vulnerabilities compromisin... 详细信息
来源: 评论
Rise of the Metaverse?s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses
收藏 引用
COMPUTERS & security 2023年 127卷
作者: Vondracek, Martin Baggili, Ibrahim Casey, Peter Mekni, Mehdi Brno Univ Technol Fac Informat Technol Bozetechova 2 Brno 61200 Czech Republic Louisiana State Univ Div Comp Sci & Engn Baton Rouge LA 70803 USA Ctr Computat & Technol Baton Rouge LA 70803 USA Univ New Haven West Haven CT 06516 USA Univ New Haven Lab Appl Software Engn Res LASER West Haven CT 06516 USA
The allure of the metaverse along with Virtual Reality (VR) technologies and speed at which they are deployed may shift focus away from security and privacy fundamentals. In this work we employ classic exploitation te... 详细信息
来源: 评论
Secure Connections in Local Networks Despite Multiple Stakeholders  1
收藏 引用
9th International Congress on Information and Communication Technology (ICICT)
作者: Karnapke, Reinhardt Heuer, Dilmari Seidel Hoeckner, Soeren Walther, Karsten Brandenburg Univ Technol Cottbus Senftenberg Cottbus Germany Perinet GmbH Berlin Berlin Germany
Computer usage authentication mostly comes in two flavors: Either as a key-value pair (name and password) or as certificates from a thrusted authority. Both approaches have their advantages and drawbacks when used for... 详细信息
来源: 评论