International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
Encryption by Heart (EbH) for Secured Data Transmission and CNN Based EKG Signal Classification of Arrhythmia with Normal Data 基于心脏加密(EbH)的安全数据传输及基于CNN的心律失常心电图信号分类
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_23
D. TarunKumar, Ramya Lakshmi Srinivasan, R. RaajanN.
{"title":"Encryption by Heart (EbH) for Secured Data Transmission and CNN Based EKG Signal Classification of Arrhythmia with Normal Data","authors":"D. TarunKumar, Ramya Lakshmi Srinivasan, R. RaajanN.","doi":"10.1007/978-981-15-0871-4_23","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_23","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prognostic Views on Software Defined Networks Based Security for Internet of Things 基于软件定义网络的物联网安全展望
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_8
Antony Taurshia, G. Kathrine, Shibin David
{"title":"Prognostic Views on Software Defined Networks Based Security for Internet of Things","authors":"Antony Taurshia, G. Kathrine, Shibin David","doi":"10.1007/978-981-15-0871-4_8","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_8","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"184 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121129413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrity Checking of Cloud Data with an Auditing Mechanism Using ECC and Merkle Hash Tree 基于ECC和Merkle哈希树的审计机制的云数据完整性检查
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_9
T. S. Praba, V. Meena
{"title":"Integrity Checking of Cloud Data with an Auditing Mechanism Using ECC and Merkle Hash Tree","authors":"T. S. Praba, V. Meena","doi":"10.1007/978-981-15-0871-4_9","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_9","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131509024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network 基于概率神经网络的关键基础设施异常检测
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_10
M. Raman, Nivethitha Somu, A. Mathur
{"title":"Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network","authors":"M. Raman, Nivethitha Somu, A. Mathur","doi":"10.1007/978-981-15-0871-4_10","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_10","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Attention-Based LSTM for Insider Threat Detection 基于注意力的LSTM内部威胁检测
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_15
Fangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, Jianlong Tan
{"title":"Attention-Based LSTM for Insider Threat Detection","authors":"Fangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, Jianlong Tan","doi":"10.1007/978-981-15-0871-4_15","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_15","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Security of the Double-Block-Length Hash Function NCASH 双块长度哈希函数NCASH的安全性研究
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_21
Tapadyoti Banerjee, D. R. Chowdhury
{"title":"On the Security of the Double-Block-Length Hash Function NCASH","authors":"Tapadyoti Banerjee, D. R. Chowdhury","doi":"10.1007/978-981-15-0871-4_21","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_21","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy-Preserving Authentication Scheme Using Reduced-Advanced Encryption Standard for Vehicular Ad Hoc Network 基于简化高级加密标准的车载Ad Hoc网络隐私保护认证方案
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_20
S. Sharon, T. S. Praba, R. Anushiadevi, V. Venkatesh
{"title":"Privacy-Preserving Authentication Scheme Using Reduced-Advanced Encryption Standard for Vehicular Ad Hoc Network","authors":"S. Sharon, T. S. Praba, R. Anushiadevi, V. Venkatesh","doi":"10.1007/978-981-15-0871-4_20","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_20","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128363704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Machine Learning Techniques Used to Combat Against the Advanced Persistent Threat 用于对抗高级持续性威胁的机器学习技术综述
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_12
Rajalakshmi E, N. Ibrahim, V. Subramaniyaswamy
{"title":"A Survey of Machine Learning Techniques Used to Combat Against the Advanced Persistent Threat","authors":"Rajalakshmi E, N. Ibrahim, V. Subramaniyaswamy","doi":"10.1007/978-981-15-0871-4_12","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_12","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Subtree Hypergraph-Based Attack Detection Model for Signature Matching over SCADA HMI 基于子树超图的SCADA HMI签名匹配攻击检测模型
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_13
Sujeet S. Jagtap, V. Sriram
{"title":"Subtree Hypergraph-Based Attack Detection Model for Signature Matching over SCADA HMI","authors":"Sujeet S. Jagtap, V. Sriram","doi":"10.1007/978-981-15-0871-4_13","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_13","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122632581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Chaotic Map Based Key Generation and Realistic Power Allocation Technique for Secure MU-MIMO Wireless System 基于混沌映射的安全MU-MIMO无线系统密钥生成与功率分配技术
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_11
C. Manikandan, S. R. Kumar, Kopparthi Nikhith, M. Gayathri, P. Neelamegam
{"title":"Chaotic Map Based Key Generation and Realistic Power Allocation Technique for Secure MU-MIMO Wireless System","authors":"C. Manikandan, S. R. Kumar, Kopparthi Nikhith, M. Gayathri, P. Neelamegam","doi":"10.1007/978-981-15-0871-4_11","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_11","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124274878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信