A survey of browser fingerprint research and application
D Zhang, J Zhang, Y Bu, B Chen… - … and Mobile Computing, 2022 - Wiley Online Library
With the development of modern browsing, the convenience brought by rich browser
features has also produced a large number of features, which are called browser …
features has also produced a large number of features, which are called browser …
Adaptive authentication system based on unsupervised learning for web-oriented platforms
AY Iskhakov, YY Khazanova, MV Mamchenko… - Mobile Computing and …, 2023 - Springer
This paper considers the problem of internal threats caused by the actions that are
performed by the employees who have legal access to the company's data or by the …
performed by the employees who have legal access to the company's data or by the …
Blockchain-Based Decentralized Federated Learning Model
H Wang, D Mao, Z Chen, H Rao… - 2023 4th International …, 2023 - ieeexplore.ieee.org
As a decentralized technology, blockchain has the characteristics of traceability and
immutability. Using blockchain technology, each model update of federation information can …
immutability. Using blockchain technology, each model update of federation information can …
Power data attribution revocation searchable encrypted cloud storage
J Li, T Zhang - 2023 3rd International Conference on Consumer …, 2023 - ieeexplore.ieee.org
Grid business data contains a large amount of electricity data customer privacy data, serving
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
more than 1.1 billion people, involving personnel, financial, material, assets and other ten …
Been Here Already? Detecting Synchronized Browsers in the Wild
P Ioannou, E Athanasopoulos - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Browsers have become the most popular and used platform for accessing the web. Their
wide and exclusive usage as a medium for doing several tasks in the Internet comes with …
wide and exclusive usage as a medium for doing several tasks in the Internet comes with …
The TaintDroid Based Honeypot Monitoring System for Embedded Device
K Cheng, Z Wu, D Li, X Li, M Ren - Journal of Physics …, 2022 - iopscience.iop.org
Honeypot is a proactive defense technology introduced by defenders. Through the
honeypots, defenders can deceive attackers to illegally take advantage of the honeypots …
honeypots, defenders can deceive attackers to illegally take advantage of the honeypots …
Sucurity Protection Framework for Power 5G Services Based on Zero-Trust Model
P Zhou, Y Guo, X Chen, L Chen… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The Energy Internet is one of the core components of the Industrial Internet, with trillions of
terminals connected to the network, linking all aspects of energy production, transmission …
terminals connected to the network, linking all aspects of energy production, transmission …
Browser Fingerprinting: Overview and Open Challenges
M Hölbl, V Zadorozhny… - Information …, 2024 - ebooks.iospress.nl
The central concept of browser fingerprinting is the collection of device-specific information
for identification or security purposes. This chapter provides an overview of the research …
for identification or security purposes. This chapter provides an overview of the research …
Application of Advanced Systems of User Identification in APCS Control Subsystems
RV Meshcheryakov, AY Iskhakov… - … Management of large …, 2023 - ieeexplore.ieee.org
This paper presents research on applying the user identification subsystem for industrial
automation systems. Within the framework of this study, we propose software and hardware …
automation systems. Within the framework of this study, we propose software and hardware …
Secure Access for Massive Devices in the Industrial Internet of Things (IIoT)
B Zhang, Z Xi, J Zhou, C He, B Lu… - 2023 4th International …, 2023 - ieeexplore.ieee.org
In the context of the widespread adoption of Industrial Internet of Things (IIoT) technology,
the number of IoT devices is rapidly increasing, leading to a significant security concern in …
the number of IoT devices is rapidly increasing, leading to a significant security concern in …