The current analysis of computer forensics is still dependent on the investigation personnel, leading to the problem of heavy workload and low efficiency. At the same time, computer evidences have the characteristics ...
详细信息
With the continuous expansion of the business scale of the Internet of Things, the concept of the Internet of Everything has been deeply rooted in the hearts of the people. At the same time, various security issues ha...
详细信息
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic...
详细信息
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi...
详细信息
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu...
详细信息
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli...
详细信息
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ...
详细信息
Kernel-level malwares are a serious threat to the integrity and security of the operating system. Current kernel integrity measurement methods have one-sidedness in selecting the measurement objects, and the character...
详细信息
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th...
详细信息
A binary program is an executable file obtained by compiling the source code. In order to reduce the size of software or prevent reverse engineering, software publishers usually only release executable files that have...
详细信息
暂无评论