ISEA Asia Security and Privacy Conference最新文献

筛选
英文 中文
Multiparty Evaluation of Finite State Machine 有限状态机的多方评估
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_17
Dhaneshwar Mardi, Jaydeep Howlader
{"title":"Multiparty Evaluation of Finite State Machine","authors":"Dhaneshwar Mardi, Jaydeep Howlader","doi":"10.1007/978-981-13-7561-3_17","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_17","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121736033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semantic Notion of Secure Information-Flow 安全信息流的语义概念
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_3
N. Kumar, R. Shyamasundar
{"title":"A Semantic Notion of Secure Information-Flow","authors":"N. Kumar, R. Shyamasundar","doi":"10.1007/978-981-13-7561-3_3","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_3","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"550 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android APPLADroid:基于自动化的Android应用间隐私泄露分析
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_16
Vineeta Jain, V. Laxmi, M. Gaur, M. Mosbah
{"title":"APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android","authors":"Vineeta Jain, V. Laxmi, M. Gaur, M. Mosbah","doi":"10.1007/978-981-13-7561-3_16","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_16","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"466 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Keystroke Dynamics Authentication Using Small Datasets 使用小数据集的击键动力学身份验证
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_7
Nataasha Raul, Royston D'mello, Mandar Bhalerao
{"title":"Keystroke Dynamics Authentication Using Small Datasets","authors":"Nataasha Raul, Royston D'mello, Mandar Bhalerao","doi":"10.1007/978-981-13-7561-3_7","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_7","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Approach to Meta-Alert Generation for Anomalous TCP Traffic 一种异常TCP流量的元警报生成方法
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_15
D. Kushwah, R. Singh, D. Tomar
{"title":"An Approach to Meta-Alert Generation for Anomalous TCP Traffic","authors":"D. Kushwah, R. Singh, D. Tomar","doi":"10.1007/978-981-13-7561-3_15","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_15","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121847904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Enhanced Privacy-Preserving Recommender System 一个增强的隐私保护推荐系统
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_18
Pranav Verma, Harshul Vaishnav, A. Mathuria, Sourish Dasgupta
{"title":"An Enhanced Privacy-Preserving Recommender System","authors":"Pranav Verma, Harshul Vaishnav, A. Mathuria, Sourish Dasgupta","doi":"10.1007/978-981-13-7561-3_18","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_18","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121732188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics BlockSLaaS:用于云取证的区块链辅助安全日志即服务
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_6
Sagar Rane, A. Dixit
{"title":"BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics","authors":"Sagar Rane, A. Dixit","doi":"10.1007/978-981-13-7561-3_6","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_6","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Machine Learning Based Approach to Detect Position Falsification Attack in VANETs 基于机器学习的VANETs位置伪造攻击检测方法
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_13
P. Singh, S. Gupta, Ritveeka Vashistha, S. Nandi, Sukumar Nandi
{"title":"Machine Learning Based Approach to Detect Position Falsification Attack in VANETs","authors":"P. Singh, S. Gupta, Ritveeka Vashistha, S. Nandi, Sukumar Nandi","doi":"10.1007/978-981-13-7561-3_13","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_13","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
ARBAC: Attribute-Enabled Role Based Access Control Model ARBAC:基于属性的角色访问控制模型
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_8
M. Singh, S. Sudharsan, M. Vani
{"title":"ARBAC: Attribute-Enabled Role Based Access Control Model","authors":"M. Singh, S. Sudharsan, M. Vani","doi":"10.1007/978-981-13-7561-3_8","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_8","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Testing Program Crash Based on Search Based Testing and Exception Injection 基于搜索测试和异常注入的程序崩溃测试
ISEA Asia Security and Privacy Conference Pub Date : 2019-01-09 DOI: 10.1007/978-981-13-7561-3_20
Faisal Anwer, Mohd Nazir, K. Mustafa
{"title":"Testing Program Crash Based on Search Based Testing and Exception Injection","authors":"Faisal Anwer, Mohd Nazir, K. Mustafa","doi":"10.1007/978-981-13-7561-3_20","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_20","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":" 72","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信