Proceedings of the 2nd International Conference on Industrial Control Network and System Engineering Research 2020
DOI: 10.1145/3411016.3411164
|View full text |Cite
|
Sign up to set email alerts
|

A two-dimensional code security authentication method based on digital watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…As an important function of the active defense system, attack behavior detection can improve the defense effect of the system and ensure the security of the network. Therefore, the attack behavior data capture module is designed to provide an effective data basis for subsequent attack behavior detection [11]. Attack data capture mainly monitors the attack behavior data in the data link layer, and transmits the captured data to the user host for subsequent processing.…”
Section: System Architecturementioning
confidence: 99%
“…As an important function of the active defense system, attack behavior detection can improve the defense effect of the system and ensure the security of the network. Therefore, the attack behavior data capture module is designed to provide an effective data basis for subsequent attack behavior detection [11]. Attack data capture mainly monitors the attack behavior data in the data link layer, and transmits the captured data to the user host for subsequent processing.…”
Section: System Architecturementioning
confidence: 99%