Information Security Practice and Experience最新文献

筛选
英文 中文
Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper) 使用监视器加强人工智能机器人的安全性(短文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_40
Orhio Mark Creado, P. D. Le
{"title":"Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper)","authors":"Orhio Mark Creado, P. D. Le","doi":"10.1007/978-3-319-72359-4_40","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_40","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121277187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper) 用B方法形式化带TrustZone硬件隔离的访问控制机制(短文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_47
Lu Ren, Rui Chang, Qing Yin, Wei Wang
{"title":"Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)","authors":"Lu Ren, Rui Chang, Qing Yin, Wei Wang","doi":"10.1007/978-3-319-72359-4_47","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_47","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A User-Friendly Centrally Banked Cryptocurrency 一个用户友好的中央银行加密货币
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_2
Xuan Han, Yamin Liu, Haixia Xu
{"title":"A User-Friendly Centrally Banked Cryptocurrency","authors":"Xuan Han, Yamin Liu, Haixia Xu","doi":"10.1007/978-3-319-72359-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_2","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130493920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper) 集成学习系统缓解恶意软件概念漂移攻击(短文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_46
Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia
{"title":"An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper)","authors":"Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia","doi":"10.1007/978-3-319-72359-4_46","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_46","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129642740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection Twitter中的垃圾邮件特征如何变化以及对基于机器学习的检测的影响
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_57
Tingmin Wu, Derek Wang, S. Wen, Yang Xiang
{"title":"How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection","authors":"Tingmin Wu, Derek Wang, S. Wen, Yang Xiang","doi":"10.1007/978-3-319-72359-4_57","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_57","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption 异构格式保持加密的分组密码操作模式
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_15
Toshiya Shimizu, Takeshi Shimoyama
{"title":"Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption","authors":"Toshiya Shimizu, Takeshi Shimoyama","doi":"10.1007/978-3-319-72359-4_15","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_15","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016 在ACNS 2015和2016的模糊签名方案中恢复针对线性草图的攻击
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_24
Masaya Yasuda, Takeshi Shimoyama, M. Takenaka, N. Abe, Shigefumi Yamada, Junpei Yamaguchi
{"title":"Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016","authors":"Masaya Yasuda, Takeshi Shimoyama, M. Takenaka, N. Abe, Shigefumi Yamada, Junpei Yamaguchi","doi":"10.1007/978-3-319-72359-4_24","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_24","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Defending Application Cache Integrity of Android Runtime 保护Android运行时的应用缓存完整性
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_45
Jia Wan, Mohammad Zulkernine, Philip A. Eisen, C. Liem
{"title":"Defending Application Cache Integrity of Android Runtime","authors":"Jia Wan, Mohammad Zulkernine, Philip A. Eisen, C. Liem","doi":"10.1007/978-3-319-72359-4_45","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_45","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Contract Coin: Toward Practical Contract Signing on Blockchain 合同币:走向b区块链的实用合同签订
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_3
Haibo Tian, Jiejie He, Liqing Fu
{"title":"Contract Coin: Toward Practical Contract Signing on Blockchain","authors":"Haibo Tian, Jiejie He, Liqing Fu","doi":"10.1007/978-3-319-72359-4_3","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_3","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128990735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper) 虚拟环境下轻量级内核级网络入侵防御系统的设计与实现(短论文)
Information Security Practice and Experience Pub Date : 2017-12-13 DOI: 10.1007/978-3-319-72359-4_36
Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang Chen, You-Chi Wang, Wen-Yu Kao
{"title":"Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper)","authors":"Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang Chen, You-Chi Wang, Wen-Yu Kao","doi":"10.1007/978-3-319-72359-4_36","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_36","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116546215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信