author: wei zhou

Future Network Systems and Security: 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings

... PDF-related CVEs each year. 2016 and 2017 saw an increase in reported CVEs, compared to previous years. Figures collected from [5] than doubling the number of reported CVEs (31 in 2015, 67 in 2016), which continued in 2017, increasing ...

Future Network Systems and Security: Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings

... OpenCV library [5] and is implemented using the FloodFill algorithm. The basic idea underlying this square recognition algorithm is to start the scanning process from the top left corner, and scan from left to right and top to bottom ...

Unraveling the Role of Psychological Capital on Innovation from the Knowledge Management Perspective

... EI can restrain the behavior of auditors' quality reduction. After data analysis, we propose a specific mechanisms of how high EI individuals use emotional ... intelligence in audit behavior by introducing the research on inhibition and ...

Future Network Systems and Security: Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings

... no longer a need to convert the password into a hash. It is important to ... survey that brute force attack often takes the longest to find a password. It does, however, go ... Password Hacking 31 2.1 Brute Force Attack 2.2 Dictionary Attack.

Qualitative Investment Decision-Making Methods under Hesitant Fuzzy Environments

... dual forms, linear transformation, and an alternative improvement method are investigated respectively. Thus, based on the above HFEA and HFPEA models, we can rank all the alternatives and improve the inefficient alternatives according ...

Discovery, Biosynthesis, Regulation, Transport, Release and Engineering of Plant Natural Products

... UTR which, when used in conjunction with the Cowpea mosaic virus 3 UTR, outperforms the commercially used Hypertrans system by approximately two-fold (Peyret et al., 2019). A combinatorial approach, utilising promoter stacking, intronic ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.