2021 2nd International Conference on Computer Communication and Network Security (CCNS)最新文献

筛选
英文 中文
Research on Network Embedded Strategy in the Initial Stage of Mobile Internet Enterprises 移动互联网企业初期网络嵌入式战略研究
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00038
Yibo Qin, Xin Zhao
{"title":"Research on Network Embedded Strategy in the Initial Stage of Mobile Internet Enterprises","authors":"Yibo Qin, Xin Zhao","doi":"10.1109/CCNS53852.2021.00038","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00038","url":null,"abstract":"Mobile Internet enterprises are playing an increasingly important role in economic development. However, different from traditional enterprises, network embedding (content embedding, relationship embedding, structure embedding) plays an important role in its start-up stage. This paper adopts the longitudinal single case study method, analyzes the focus of Hangzhou network embedding strategy in three stages (creation stage, survival period, growth period), and its impact on enterprise growth, and draws the following conclusion: First, the main network embedding strategy of Internet startup in the creation period is the relationship network of entrepreneurs, and realizes the preliminary network common cognitive mode supplemented by content embedding; Second, after the existence of a certain user base, the enterprise further expands the network scale through the word-of-mouth effect and secondary communication to improve users’ sense of participation, thus improving users’ stickiness and enterprise popularity. Third, in the growth period, enterprises take advantage of the industry position through the continuous evolution of structural embedded strategy, obtain more resources and information, and improve the strength of enterprises. The research has found the law of network embedding in the initial stage of Internet enterprises, which provides a new idea for the research of network embedding strategy of mobile Internet enterprises.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117249918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving Multi-cloud based Dynamic Symmetric Searchable Encryption 基于多云的动态对称可搜索加密保护隐私
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00040
Wanshan Xu, Jian-biao Zhang, Yilin Yuan, Zheng Li
{"title":"Privacy-preserving Multi-cloud based Dynamic Symmetric Searchable Encryption","authors":"Wanshan Xu, Jian-biao Zhang, Yilin Yuan, Zheng Li","doi":"10.1109/CCNS53852.2021.00040","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00040","url":null,"abstract":"Symmetric searchable encryption (SSE) provides a secure and efficient way for users to search on the encrypted data stored on the cloud. Most of the existing SSE schemes reveal the search pattern and access pattern during the query of keywords, which can be used to derive the keyword to query or contained in documents. To solve this problem, we propose a privacy-preserving multi-cloud based dynamic SSE scheme, called PMD-SSE, which implements the privacy protection and dynamic update of SSE. To protect the search pattern and access pattern, we divide the index into blocks of the same size and distribute them to multiple clouds, and an index cache is conducted to improve the efficiency of shuffling. We shuffle and re-encrypt the entities in index cache after each query, and then redistribute them to clouds randomly. Furthermore, PMD-SSE supports dynamic update of SSE, and realizes the forward security in dynamic update through the pseudo-random function. At last, formal security analysis show that PMD-SSE is adaptive secure against malicious attacks.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"780 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116061370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on image Recognition Technology Based on Artificial Intelligence 基于人工智能的图像识别技术研究
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00009
Liang Kai, Tianjun Wang, Jingfeng Xiao
{"title":"Research on image Recognition Technology Based on Artificial Intelligence","authors":"Liang Kai, Tianjun Wang, Jingfeng Xiao","doi":"10.1109/CCNS53852.2021.00009","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00009","url":null,"abstract":"Image recognition technology is an important field in artificial intelligence. With the development of society and the progress of technology, image recognition technology has gradually been more widely used. This paper introduces the principle of image recognition technology and discusses the advantages of image recognition technology in artificial intelligence. The main function of image recognition technology is to liberate manpower. By using this technology to identify and process all kinds of information, labor intensity can be reduced, and labor efficiency and work quality can be improved. Based on this, this paper discusses the artificial intelligence image recognition technology and its specific application based on the principle of image recognition technology, hoping to help more people understand this technology and maximize the use value of this technology.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on the Technology of Real-time Data Exchange and Multi-type Information Fusion in Security Protection Area 安全防护领域实时数据交换与多类型信息融合技术研究
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00030
Sixu Huang, Guo Zhao, Jiang Guo, Wenqiang Zhu, Fang Yuan
{"title":"Research on the Technology of Real-time Data Exchange and Multi-type Information Fusion in Security Protection Area","authors":"Sixu Huang, Guo Zhao, Jiang Guo, Wenqiang Zhu, Fang Yuan","doi":"10.1109/CCNS53852.2021.00030","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00030","url":null,"abstract":"The operation monitoring data collected by the distribution network automation system are varied and huge. The data exchange ability between different regions and platforms is weak, and the service construction of the operation state control system of the provincial distribution network is inflexible. This paper proposes a new method of information exchange in the security protection area, which can reduce the risk of protocol conversion. At the same time, aiming at the requirement of full sharing among different systems, it can realize the two-way cross-region transmission of real-time multi-type information. By using the corresponding technology, the comparison and correspondence of the equipment in multiple departments can be completed. So that the cross-department system can identify the equipment in other systems intelligently and flexibly, and realize the equipment information sharing.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127492904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent campus construction plan based on Internet technology 基于互联网技术的智能校园建设方案
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00039
Qingfen Wang, Zhigang Xu, Qingkuan Wang, Zhaolong Wang
{"title":"Intelligent campus construction plan based on Internet technology","authors":"Qingfen Wang, Zhigang Xu, Qingkuan Wang, Zhaolong Wang","doi":"10.1109/CCNS53852.2021.00039","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00039","url":null,"abstract":"This paper researches the intelligent campus construction plan under the conditions of informatization. First, we have analyzed the current situation of intelligent campus construction in colleges and universities. Then, we put forward corresponding solutions, and use service-oriented system architecture to analyze and design intelligent campus construction. Finally, we developed a “one-stop”, “all-in-one card”, and “integrated” smart campus management system. It fully combines the actual needs and management characteristics. Meanwhile, it makes full use of information technologies such as the Internet of Things and cloud computing. This research is of great importance for realizing the digitization and intelligence of facilities and equipment, the networking of information resources as well as the visualization of daily management in the campus.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Webshell Detection Model Based On Bayes 基于贝叶斯的Webshell检测模型
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00022
Jian Yang
{"title":"A Webshell Detection Model Based On Bayes","authors":"Jian Yang","doi":"10.1109/CCNS53852.2021.00022","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00022","url":null,"abstract":"Webshell is a command-page document that exists in the form of execution of the program, also known as a backdoor, is an essential means of hacking website uses. Due to the great harm of webshell, webshell detection has become a key research direction in network security. At present, there are many types of research and results in webshell detection, such as the commonly used detection tools such as “safe dog”, “Dshield”, and “Hippo”. Most of these tools are based on the signature to detect, and the detection accuracy is not ideal. By analyzing the current status of Webshell detection methods, this paper proposes a Webshell detection method based on the Naive Bayes algorithm, and uses Python for implementation and results analysis. This model can effectively detect Webshell that has been fuzzy coded, and improve the accuracy of detection.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131151512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-attacks on cameras in the IoT networks 对物联网摄像头的网络攻击
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00027
Junyan Li
{"title":"Cyber-attacks on cameras in the IoT networks","authors":"Junyan Li","doi":"10.1109/CCNS53852.2021.00027","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00027","url":null,"abstract":"The use of IoT devices has been a ubiquitous phenomenon nowadays, different functionalities are being designed, manufactured, and connected to the network so they can now interconnect and exchange data with each other. Despite the benefits, these devices are also subject to several security risks. This paper will present an overview that targeting some common cyber-attacks of internet-connected surveillance camera in IoT networks, comparing threats and available solutions to discuss the problems and future research directions.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134040129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of a Risk Assessment System for Information Communication Equipment 信息通信设备风险评估系统的设计与实现
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00010
Li Juan, Yan Lina, Wang Jingyu
{"title":"Design and Implementation of a Risk Assessment System for Information Communication Equipment","authors":"Li Juan, Yan Lina, Wang Jingyu","doi":"10.1109/CCNS53852.2021.00010","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00010","url":null,"abstract":"In order to ensure the security of information assets and standardize the risk assessment and inspection workflow of information assets. This paper has designed and developed a risk assessment system for information and communication equipment with simple operation, offline assessment, and diversified external interfaces. The process of risk assessment can be realized, which effectively improves the efficiency of risk assessment.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Operation Management and Maintenance Strategy of Communication Network 通信网络运行管理与维护策略研究
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00008
C. Wanyu, Jiang Tongjun, Cao Jianmei, Zhang Jinghua, Zhang Xueran
{"title":"Research on Operation Management and Maintenance Strategy of Communication Network","authors":"C. Wanyu, Jiang Tongjun, Cao Jianmei, Zhang Jinghua, Zhang Xueran","doi":"10.1109/CCNS53852.2021.00008","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00008","url":null,"abstract":"With the rapid development of computer network technology, communication network technology plays an important role in people’s life and work, seeking development space for all walks of life and winning huge profits. It not only makes the communication between people more convenient, but also brings a lot of convenience for people’s study and work. However, there are many problems in the development of communication network technology, which restricts its development. Aiming at these problems, this paper discusses the strategy of maintaining the operation of communication network, and traces its essence.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison and Analysis of Data and Transaction Structure of Bitcoin and Ethereum 比特币和以太坊的数据和交易结构比较分析
2021 2nd International Conference on Computer Communication and Network Security (CCNS) Pub Date : 2021-07-01 DOI: 10.1109/CCNS53852.2021.00029
Y. Huangt, Wangzhenfan Qiu, C. Wut
{"title":"Comparison and Analysis of Data and Transaction Structure of Bitcoin and Ethereum","authors":"Y. Huangt, Wangzhenfan Qiu, C. Wut","doi":"10.1109/CCNS53852.2021.00029","DOIUrl":"https://doi.org/10.1109/CCNS53852.2021.00029","url":null,"abstract":"With the increasing maturity of encryption algorithms, digital currency emerges as the times require. Blockchain is a highly attractive candidate for developing digital currency. A better understanding of the mechanisms for Blockchain will benefit the comprehensive future development of Blockchain. In the current study, we observed the data and transaction structure of Bitcoin and Ethereum. Therefore, Our study compared the existing structure of Bitcoin and Ethereum and analyzed the reasons for the change of the Blockchain, providing insights for the future development of the Blockchain. The results of this study indicate that he future development of Blockchain will increasingly meet the increasing number of users, lower the threshold for users, meet increasingly cumbersome functional requirements, expand the scope of blockchain applications, and improve security.","PeriodicalId":142980,"journal":{"name":"2021 2nd International Conference on Computer Communication and Network Security (CCNS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122773561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信