{"title":"Assessing Vulnerability from Its Description","authors":"Zijing Zhang, Vimal Kumar, Michael Mayo, A. Bifet","doi":"10.1007/978-981-99-0272-9_9","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_9","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Signal Packing Algorithm for CAN-FD with Security Consideration","authors":"Boxiang Zheng, Yong Xie","doi":"10.1007/978-981-99-0272-9_20","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_20","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shaila Sharmin, Hafizah Mansor, A. A. Kadir, N. A. Aziz
{"title":"Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network","authors":"Shaila Sharmin, Hafizah Mansor, A. A. Kadir, N. A. Aziz","doi":"10.1007/978-981-19-0468-4_10","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_10","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116060886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saad Khan, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi
{"title":"Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network","authors":"Saad Khan, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi","doi":"10.1007/978-981-99-0272-9_37","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_37","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121034520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks","authors":"Hossein Keipour, S. Hazra, N. Finne, T. Voigt","doi":"10.1007/978-981-19-0468-4_16","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_16","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128692628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yun Duan, Laifu Wang, Dongxin Liu, B. Deng, Yunfan Tian
{"title":"Malware Traffic Classification Based on GAN and BP Neural Networks","authors":"Yun Duan, Laifu Wang, Dongxin Liu, B. Deng, Yunfan Tian","doi":"10.1007/978-981-99-0272-9_10","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_10","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115248421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}