International Conference on Ubiquitous Security最新文献

筛选
英文 中文
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks PUFloc:基于PUF和位置的监视无人机网络分层相互认证协议
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_6
Aiswarya S. Nair, S. Thampi
{"title":"PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks","authors":"Aiswarya S. Nair, S. Thampi","doi":"10.1007/978-981-19-0468-4_6","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_6","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM 基于CNN-BiLSTM的多标签分类模型智能合约未知漏洞检测
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_4
Wanyi Gu, Guojun Wang, Peiqian Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen
{"title":"Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM","authors":"Wanyi Gu, Guojun Wang, Peiqian Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen","doi":"10.1007/978-981-99-0272-9_4","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_4","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125480702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media 基于位置感知的区块链解决方案,以区分社交媒体中的假新闻
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_9
Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md Zakirul Alam Bhuiyan, A. Omar
{"title":"Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media","authors":"Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md Zakirul Alam Bhuiyan, A. Omar","doi":"10.1007/978-981-19-0468-4_9","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_9","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security 有监督机器学习在网络安全中的应用和测量的可变性
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_38
Omar Alshaikh, S. Parkinson, Saad Khan
{"title":"On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security","authors":"Omar Alshaikh, S. Parkinson, Saad Khan","doi":"10.1007/978-981-99-0272-9_38","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_38","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System Progger 3的设计与体系结构:一个低开销、防篡改的溯源系统
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_14
Tristan Corrick, Vimal Kumar
{"title":"Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System","authors":"Tristan Corrick, Vimal Kumar","doi":"10.1007/978-981-19-0468-4_14","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_14","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"19 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments 云部署安全漏洞的大规模研究
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_13
Iosif Andrei-Cristian, T. Gasiba, Tiange Zhao, U. Lechner, M. Pinto-Albuquerque
{"title":"A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments","authors":"Iosif Andrei-Cristian, T. Gasiba, Tiange Zhao, U. Lechner, M. Pinto-Albuquerque","doi":"10.1007/978-981-19-0468-4_13","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_13","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121467713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication 聆听音乐:评估音乐在基于音频的认证中的使用
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_2
Michael Tsai, Vimal Kumar
{"title":"Listen to the Music: Evaluating the Use of Music in Audio Based Authentication","authors":"Michael Tsai, Vimal Kumar","doi":"10.1007/978-981-99-0272-9_2","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_2","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning 基于协同深度学习的传感器云数据隐私保护模型
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_29
Xiaoqian Ran, Yufeng Zhuang, Hongping Wang, Danni Cao, Yulian Cao, Wenjuan Gu
{"title":"Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning","authors":"Xiaoqian Ran, Yufeng Zhuang, Hongping Wang, Danni Cao, Yulian Cao, Wenjuan Gu","doi":"10.1007/978-981-99-0272-9_29","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_29","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis 基于大数据分析的交互式查询差分隐私保护模型
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-0272-9_23
Guanghui Feng, Wenyin Yang, Tao Peng, X. Xing, Shuhong Chen, Yuting Li
{"title":"An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis","authors":"Guanghui Feng, Wenyin Yang, Tao Peng, X. Xing, Shuhong Chen, Yuting Li","doi":"10.1007/978-981-99-0272-9_23","DOIUrl":"https://doi.org/10.1007/978-981-99-0272-9_23","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm 基于多模态融合机器学习算法的主动恶意账户检测
International Conference on Ubiquitous Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-0468-4_4
Yuting Tang, Dafang Zhang, W. Liang, Kuang Li, Nitin Sukhija
{"title":"Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm","authors":"Yuting Tang, Dafang Zhang, W. Liang, Kuang Li, Nitin Sukhija","doi":"10.1007/978-981-19-0468-4_4","DOIUrl":"https://doi.org/10.1007/978-981-19-0468-4_4","url":null,"abstract":"","PeriodicalId":232780,"journal":{"name":"International Conference on Ubiquitous Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123149135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信