International Conference on Ubiquitous Security最新文献

筛选
英文 中文
Assessing Vulnerability from Its Description 根据其描述评估漏洞
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_9
Zijing Zhang, Vimal Kumar, Michael Mayo, A. Bifet
{"title":"Assessing Vulnerability from Its Description","authors":"Zijing Zhang, Vimal Kumar, Michael Mayo, A. Bifet","doi":"10.1007/978-981-99-0272-9_9","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_9","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Signal Packing Algorithm for CAN-FD with Security Consideration 一种考虑安全性的CAN-FD信号打包新算法
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_20
Boxiang Zheng, Yong Xie
{"title":"A New Signal Packing Algorithm for CAN-FD with Security Consideration","authors":"Boxiang Zheng, Yong Xie","doi":"10.1007/978-981-99-0272-9_20","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_20","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Clustering Algorithm for Mixed Data 混合数据的差分私有聚类算法
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_27
Kai Cheng, Liandong Chen, Huifeng Yang, Dan Luo, Shuai Yuan, Zhitao Guan
{"title":"Differentially Private Clustering Algorithm for Mixed Data","authors":"Kai Cheng, Liandong Chen, Huifeng Yang, Dan Luo, Shuai Yuan, Zhitao Guan","doi":"10.1007/978-981-99-0272-9_27","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_27","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131887244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network 基于流数据算法的车载控制器局域网入侵检测
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_10
Shaila Sharmin, Hafizah Mansor, A. A. Kadir, N. A. Aziz
{"title":"Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network","authors":"Shaila Sharmin, Hafizah Mansor, A. A. Kadir, N. A. Aziz","doi":"10.1007/978-981-19-0468-4_10","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_10","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116060886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network 基于设计路线规划的无线传感器网络多移动智能体安全
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_37
Saad Khan, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi
{"title":"Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network","authors":"Saad Khan, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi","doi":"10.1007/978-981-99-0272-9_37","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_37","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121034520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks 物联网网状网络入侵检测的泛化监督学习
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_16
Hossein Keipour, S. Hazra, N. Finne, T. Voigt
{"title":"Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks","authors":"Hossein Keipour, S. Hazra, N. Finne, T. Voigt","doi":"10.1007/978-981-19-0468-4_16","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_16","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128692628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Malware Traffic Classification Based on GAN and BP Neural Networks 基于GAN和BP神经网络的恶意软件流量分类
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_10
Yun Duan, Laifu Wang, Dongxin Liu, B. Deng, Yunfan Tian
{"title":"Malware Traffic Classification Based on GAN and BP Neural Networks","authors":"Yun Duan, Laifu Wang, Dongxin Liu, B. Deng, Yunfan Tian","doi":"10.1007/978-981-99-0272-9_10","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_10","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115248421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids 针对智能电网恶意签名攻击的隐私增强均值方差方案
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_11
Yuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang
{"title":"Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids","authors":"Yuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang","doi":"10.1007/978-981-19-0468-4_11","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_11","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114452551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skill Reward for Safe Deep Reinforcement Learning 安全深度强化学习的技能奖励
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_15
Jiangchang Cheng, Fei Yu, Hongliang Zhang, Yinglong Dai
{"title":"Skill Reward for Safe Deep Reinforcement Learning","authors":"Jiangchang Cheng, Fei Yu, Hongliang Zhang, Yinglong Dai","doi":"10.1007/978-981-19-0468-4_15","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_15","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134071835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment 云计算环境下教学资源带宽预留算法研究
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_27
Hongling Chen, Zhiwen Liao, Qin Liu
{"title":"Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment","authors":"Hongling Chen, Zhiwen Liao, Qin Liu","doi":"10.1007/978-981-19-0468-4_27","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_27","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132332207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信