Abstract: The pervasiveness of Pass-the-Hash (PtH) attacks within Microsoft Active Directory environments poses a high security risk to organizations globally. This paper proposes an open-source based ...
Abstract: In recent years, numerous hashing techniques have been developed to boost efficient cross-modal retrieval. Once a retrieval model is deployed, the hash code length is fixed to achieve ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results