咨询与建议

限定检索结果

文献类型

  • 89 篇 会议
  • 40 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 76 篇 工学
    • 64 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 17 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 9 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 核科学与技术
    • 2 篇 网络空间安全
  • 24 篇 理学
    • 11 篇 数学
    • 6 篇 物理学
    • 6 篇 系统科学
    • 5 篇 统计学(可授理学、...
    • 4 篇 生物学
  • 23 篇 管理学
    • 13 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
    • 3 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 10 篇 security
  • 9 篇 authentication
  • 8 篇 safety
  • 7 篇 privacy
  • 6 篇 network security
  • 6 篇 cryptography
  • 4 篇 data privacy
  • 4 篇 internet
  • 4 篇 authorization
  • 3 篇 internet of thin...
  • 3 篇 scalability
  • 3 篇 access control
  • 3 篇 computer crime
  • 3 篇 servers
  • 3 篇 risk management
  • 3 篇 predictive model...
  • 3 篇 decision making
  • 3 篇 information secu...
  • 3 篇 protocols
  • 3 篇 protection

机构

  • 10 篇 communication an...
  • 6 篇 security in dist...
  • 6 篇 security and pri...
  • 5 篇 communication an...
  • 5 篇 cyber analysis &...
  • 4 篇 cyber analysis &...
  • 4 篇 laboratory of di...
  • 4 篇 laboratory of se...
  • 3 篇 industrial engin...
  • 3 篇 security and pri...
  • 3 篇 distributed and ...
  • 3 篇 department of ma...
  • 3 篇 institute of dis...
  • 3 篇 laboratory of id...
  • 3 篇 distributed and ...
  • 2 篇 school of softwa...
  • 2 篇 parallel and dis...
  • 2 篇 helmut-schmidt-u...
  • 2 篇 distributed and ...
  • 2 篇 trialog

作者

  • 10 篇 wehrle klaus
  • 10 篇 henze martin
  • 8 篇 pennekamp jan
  • 5 篇 klaus wehrle
  • 5 篇 martin henze
  • 4 篇 dahlmanns markus
  • 4 篇 kargl frank
  • 4 篇 federrath hannes
  • 4 篇 frank kargl
  • 4 篇 hannes federrath
  • 4 篇 wagner eric
  • 3 篇 schall daniel
  • 3 篇 smith matthew
  • 3 篇 choo kim-kwang r...
  • 3 篇 elena jharko
  • 3 篇 gollmann dieter
  • 3 篇 herrmann dominik
  • 3 篇 abdulova ekateri...
  • 3 篇 matzutt roman
  • 3 篇 jan pennekamp

语言

  • 125 篇 英文
  • 5 篇 其他
检索条件"机构=Security in Distributed Systems"
130 条 记 录,以下是1-10 订阅
排序:
Probing with a Generic MAC Address: An Alternative to MAC Address Randomisation  32
Probing with a Generic MAC Address: An Alternative to MAC Ad...
收藏 引用
32nd International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2024
作者: McDougall, Johanna Ansohn Brighente, Alessandro Kunstmann, Anne Zapatka, Niklas Schambach, Hanna Federrath, Hannes University of Hamburg Security in Distributed Systems Hamburg Germany University of Padova Department of Mathematics Padua Italy
Active scanning via probe requests is a means for mobile devices to detect known networks. To protect the device from being tracked via an unchanging identifier contained in the probe request, MAC address randomisatio... 详细信息
来源: 评论
A Multi-Tenancy System Architecture for Online Examinations  36
A Multi-Tenancy System Architecture for Online Examinations
收藏 引用
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023
作者: Andre, Jonas Naab, Johannes Jaeger, Benedikt Carle, Georg Seidlitz, Leander Günther, Stephan Network Architectures and Services Germany Distributed Systems and Security School of Computation Information and Technology Germany
Time-synchronous online examinations pose new demands on our infrastructure: lectures with more than 1000 students are common at TUM, and in case of time-synchronous examinations students concurrently download working... 详细信息
来源: 评论
Unveiling the Black Box: Neural Cryptanalysis with XAI
Unveiling the Black Box: Neural Cryptanalysis with XAI
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Goi, Yue-Tian Leong, Shu-Min Phan, Raphael C.-W. Lai, Shangqi Salagean, Ana School of Information Technology Monash University Australia CSIRO's Data61 Distributed Systems Security Group Australia Loughborough University Department of Computer Science United Kingdom
At CRYPTO'19, Gohr[1] presented ResNet-based neural distinguishers (ND) for the round-reduced SPECK32/64 cipher. However, due to the black-box use of such deep learning models, it is hard for humans to understand ... 详细信息
来源: 评论
Algorithm for Determining the Safety Functions of a Dynamic Technical System and the Concept of Their Presentation on the Safety Monitor
Algorithm for Determining the Safety Functions of a Dynamic ...
收藏 引用
2024 International Russian Automation Conference, RusAutoCon 2024
作者: Jharko, Elena Abdulova, Ekaterina V.A. Trapeznikov Institute of Control Sciences of the Russian Academy of Sciences Laboratory of Distributed Information Analytical and Control Systems Moscow Russia V.A. Trapeznikov Institute of Control Sciences of the Russian Academy of Sciences Laboratory of Security of Complex Systems Moscow Russia
The paper discusses approaches to ensuring the safety of dynamic technical systems, focusing on developing and implementing an algorithm for determining safety functions. The paper's primary goal is to create a re... 详细信息
来源: 评论
Probing with a Generic MAC Address: An Alternative to MAC Address Randomisation
Probing with a Generic MAC Address: An Alternative to MAC Ad...
收藏 引用
International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
作者: Johanna Ansohn McDougall Alessandro Brighente Anne Kunstmann Niklas Zapatka Hanna Schambach Hannes Federrath Security in Distributed Systems University of Hamburg Hamburg Germany Department of Mathematics University of Padova Padua Italy
Active scanning via probe requests is a means for mobile devices to detect known networks. To protect the device from being tracked via an unchanging identifier contained in the probe request, MAC address randomisatio... 详细信息
来源: 评论
Let me quickly share it - Time Pressure when Sharing on Social Media  24
Let me quickly share it - Time Pressure when Sharing on Soci...
收藏 引用
23rd International Conference on Mobile and Ubiquitous Multimedia, MUM 2024
作者: Panskus, Rebecca Tanni, Tangila Islam Ponticello, Alexander Meissner, Echo Solihin, Yan Krombholz, Katharina Marky, Karola Ruhr University Bochum Bochum Germany Department of Computer Science University of Central Florida Orlando United States CISPA Helmholtz Center for Information Security Saarland University Germany Saarbrücken Germany Institute of Distributed Systems Ulm University Ulm Germany CISPA Helmholtz Center for Information Security Saarbrücken Germany
Photo sharing has become an integral part of social media;many new platforms even prompt their users to share photos under time pressure. Yet, sharing photos can also affect the privacy of individuals in a negative wa... 详细信息
来源: 评论
You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics
You Are as You Type: Investigating the Influence of Timestam...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Florian Dehling Sebastian Koch Luigi Lo Iacono Hannes Federrath Institute of Computer Science University of Giessen Giessen Germany Security in Distributed Systems University of Hamburg Hamburg Germany
Keystroke dynamics are behavioral biometric traits that are frequently proposed to be used in novel authentication systems. Keystroke dynamics are based on the analysis of intervals between keystroke events originatin... 详细信息
来源: 评论
CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping
arXiv
收藏 引用
arXiv 2025年
作者: Wagner, Eric Basels, Frederik Bauer, Jan Zimmermann, Till Wehrle, Klaus Henze, Martin Cyber Analysis & Defense Fraunhofer FKIE United States Communication and Distributed Systems RWTH Aachen University Germany Distributed Systems Group Osnabrück University Germany Security and Privacy in Industrial Cooperation RWTH Aachen University Germany
—Controller Area Networks (CANs) are the backbone for reliable intra-vehicular communication. Recent cyberattacks have, however, exposed the weaknesses of CAN, which was designed without any security considerations i... 详细信息
来源: 评论
DMTP: Deadline-aware Multipath Transport Protocol
DMTP: Deadline-aware Multipath Transport Protocol
收藏 引用
IFIP Networking Conference
作者: Tony John Adrian Perrig David Hausheer OVGU Magdeburg Networks and Distributed Systems Lab Network Security Group ETH Zürich
Increasing demand for real-time applications such as teleoperation, remote control of a process, and live video streaming has led to the need for more efficient and reliable transport protocols that can satisfy strict...
来源: 评论
Intellectualized Operator Information Support System for NPP: Expert systems and Dynamic Models
Intellectualized Operator Information Support System for NPP...
收藏 引用
2024 International Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM 2024
作者: Jharko, Elena Chernyshov, Kirill Abdulova, Ekaterina Laboratory Of Distributed Information Analytical And Control Systems V.A. Trapeznikov Institute Of Control Sciences Of The Russian Academy Of Sciences Moscow Russia Laboratory Of Identification Of Control Systems V.A. Trapeznikov Institute Of Control Sciences Of The Russian Academy Of Sciences Moscow Russia Laboratory Of Security Of Complex Systems V.A. Trapeznikov Institute Of Control Sciences Of The Russian Academy Of Sciences Moscow Russia
The article discusses an approach that combines expert systems and dynamic models in an intellectualized operator information support system (IOISS) for nuclear power plant units. The main goal of this approach is to ... 详细信息
来源: 评论