International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space 递归M-ORAM:具有约束存储空间客户端的矩阵ORAM
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_11
Karin Sumongkayothin, Steven Gordon, A. Miyaji, Chunhua Su, K. Wipusitwarakun
{"title":"Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space","authors":"Karin Sumongkayothin, Steven Gordon, A. Miyaji, Chunhua Su, K. Wipusitwarakun","doi":"10.1007/978-981-10-2741-3_11","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_11","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"276 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating Security Vulnerabilities in Modern Vehicle Systems 调查现代车辆系统中的安全漏洞
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_3
Xi Zheng, Lei Pan, Hongxu Chen, Peiyin Wang
{"title":"Investigating Security Vulnerabilities in Modern Vehicle Systems","authors":"Xi Zheng, Lei Pan, Hongxu Chen, Peiyin Wang","doi":"10.1007/978-981-10-2741-3_3","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Evaluating Entropy Sources for True Random Number Generators by Collision Counting 用碰撞计数评价真随机数生成器的熵源
International Conference on Applications and Techniques in Information Security Pub Date : 2016-10-26 DOI: 10.1007/978-981-10-2741-3_6
M. Skorski
{"title":"Evaluating Entropy Sources for True Random Number Generators by Collision Counting","authors":"M. Skorski","doi":"10.1007/978-981-10-2741-3_6","DOIUrl":"https://doi.org/10.1007/978-981-10-2741-3_6","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127163831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation EyeEncrypt:视网膜图像分割的网络安全框架
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-2264-2_9
Govardhan Hegde, Shourya Gupta, G. M. Prabhu, S. Bhandary
{"title":"EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation","authors":"Govardhan Hegde, Shourya Gupta, G. M. Prabhu, S. Bhandary","doi":"10.1007/978-981-99-2264-2_9","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_9","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129294237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel SDN-Based IOT Security Architecture Model for Big Data 基于sdn的物联网大数据安全架构模型
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-1166-8_11
Ojaswi Bhimineni, G. Abhijith, Srikanth Prabhu
{"title":"A Novel SDN-Based IOT Security Architecture Model for Big Data","authors":"Ojaswi Bhimineni, G. Abhijith, Srikanth Prabhu","doi":"10.1007/978-981-19-1166-8_11","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_11","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131249270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near Real-Time Federated Machine Learning Approach Over Chest Computed Tomography for COVID-19 Diagnosis 基于胸部计算机断层扫描的近实时联邦机器学习方法用于COVID-19诊断
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-1166-8_3
Yang Cao
{"title":"Near Real-Time Federated Machine Learning Approach Over Chest Computed Tomography for COVID-19 Diagnosis","authors":"Yang Cao","doi":"10.1007/978-981-19-1166-8_3","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Face Recognition Accuracy Using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security 基于ED-FFP提取方法和取证与网络安全集成学习的人脸识别精度提高
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-2264-2_11
Pranav Virmani, S. Prabhu, S. Ramya
{"title":"Enhancing Face Recognition Accuracy Using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security","authors":"Pranav Virmani, S. Prabhu, S. Ramya","doi":"10.1007/978-981-99-2264-2_11","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_11","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security and Layering of Medical Data Using Machine Learning Algorithms 使用机器学习算法的网络安全和医疗数据分层
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-2264-2_17
Anmol Garg, Jay Singhvi, Saurav Sabu, Rushikesh Sahu, Srikanth Prabhu, Arti Pawar
{"title":"Cyber Security and Layering of Medical Data Using Machine Learning Algorithms","authors":"Anmol Garg, Jay Singhvi, Saurav Sabu, Rushikesh Sahu, Srikanth Prabhu, Arti Pawar","doi":"10.1007/978-981-99-2264-2_17","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_17","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131180099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensics for Drones: A Study of Tools and Techniques 无人机数字取证:工具和技术研究
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-33-4706-9_3
Sowmya Vishvanathan, Z. Baig
{"title":"Digital Forensics for Drones: A Study of Tools and Techniques","authors":"Sowmya Vishvanathan, Z. Baig","doi":"10.1007/978-981-33-4706-9_3","DOIUrl":"https://doi.org/10.1007/978-981-33-4706-9_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Detecting Anomalies in Natural Gas Production: A Boosting Tree Based Model 天然气生产异常检测:基于提升树的模型
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-1166-8_7
Sibo Yang, Zhenjia Wang, Liping Liu, Yang Liu, Hu Chen, X. Tang
{"title":"Detecting Anomalies in Natural Gas Production: A Boosting Tree Based Model","authors":"Sibo Yang, Zhenjia Wang, Liping Liu, Yang Liu, Hu Chen, X. Tang","doi":"10.1007/978-981-19-1166-8_7","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_7","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116165509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信