Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
基于大数据分析的 APT 攻击检测研究综述
付钰, **洪成, 吴晓**, 王甲生 - 通信学报, 2015 - infocomm-journal.com
高级持续性威胁(APT, advanced persistent threat) 已成为高安全等级网络的最主要威胁之一,
其极**的针对性, 伪装性和阶段性使传统检测技术无法有效识别, 因此新型攻击检测技术成为 …
其极**的针对性, 伪装性和阶段性使传统检测技术无法有效识别, 因此新型攻击检测技术成为 …
[PDF][PDF] Detecting APT attacks: a survey from the perspective of big data analysis
Y Fu, H Li, X Wu, J Wang - Journal on Communications, 2015 - infocomm-journal.com
Advanced persistent threats have become the major threats of highly protected networks.
Traditional detecting technologies were not able to find out APT attacks which were targeted …
Traditional detecting technologies were not able to find out APT attacks which were targeted …
A trust-based collaborative access control model with policy aggregation for online social networks
Online social network (OSN) has become one of the primary means of interaction and digital
information sharing among individuals. Preserving information privacy is indispensable in …
information sharing among individuals. Preserving information privacy is indispensable in …
IRIS: A novel method of direct trust computation for generating trusted social networks
S Hamdi, AL Gancarski, A Bouzeghoub… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
Improving trust in social networks appears as the first step toward addressing the existing
confidence and privacy concerns related to online social networks. Direct trust is used to …
confidence and privacy concerns related to online social networks. Direct trust is used to …
Relationship strength based access control in online social networks
Online social networking site is a platform, where a person can communicate with others by
creating his own profile. Lots of contents (eg, photos, videos, etc.) are being generated every …
creating his own profile. Lots of contents (eg, photos, videos, etc.) are being generated every …
isac: Intimacy based access control for social network sites
Participation in social networking sites has dramatically increased in recent years. Users on
social networking sites spend lots of time generating large quantities of various personal …
social networking sites spend lots of time generating large quantities of various personal …
Access control in social networks: a reachability-based approach
IB Dhia - Proceedings of the 2012 Joint EDBT/ICDT Workshops, 2012 - dl.acm.org
Nowadays, social networks are attracting more and more users. These social network
subscribers may share personal and sensitive information with a large number of possibly …
subscribers may share personal and sensitive information with a large number of possibly …
Carte auto-organisatrice pour graphes étiquetés.
Dans de nombreux cas d'études concrets, l'analyse de données sur les graphes n'est pas
limitée à la seule connaissance du graphe. Il est courant que des informations …
limitée à la seule connaissance du graphe. Il est courant que des informations …
Efficient sink-reachability analysis via graph reduction
The reachability problem on directed graphs, asking whether two vertices are connected via
a directed path, is an elementary problem that has been well-studied. In this paper, we study …
a directed path, is an elementary problem that has been well-studied. In this paper, we study …
PePPer: Fine-grained personal access control via peer probing
Y Amsterdamer, O Drien - 2019 IEEE 35th International …, 2019 - ieeexplore.ieee.org
Users share data on multiple platforms where access control is managed according to the
platform-specific policy. However, some data is conceptually owned by peers in a manner …
platform-specific policy. However, some data is conceptually owned by peers in a manner …