Security and Privacy in Communication Networks最新文献

筛选
英文 中文
CustomPro: Network Protocol Customization Through Cross-Host Feature Analysis CustomPro:通过跨主机特征分析的网络协议定制
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_4
Yurong Chen, Tian Lan, Guru Venkataramani
{"title":"CustomPro: Network Protocol Customization Through Cross-Host Feature Analysis","authors":"Yurong Chen, Tian Lan, Guru Venkataramani","doi":"10.1007/978-3-030-37231-6_4","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_4","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"605 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity 检测根级端点传感器与相关活动的妥协
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_15
Yu Lei, Craig A. Shue
{"title":"Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity","authors":"Yu Lei, Craig A. Shue","doi":"10.1007/978-3-030-37231-6_15","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_15","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Victim-Aware Adaptive Covert Channels 受害者意识自适应隐蔽通道
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_22
Riccardo Bortolameotti, T. V. Ede, Andrea Continella, M. Everts, W. Jonker, P. Hartel, Andreas Peter
{"title":"Victim-Aware Adaptive Covert Channels","authors":"Riccardo Bortolameotti, T. V. Ede, Andrea Continella, M. Everts, W. Jonker, P. Hartel, Andreas Peter","doi":"10.1007/978-3-030-37228-6_22","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_22","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams TL;DR Hazard: Levelsquatting骗局的综合研究
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_1
Kun Du, Hao Yang, Zhou Li, Haixin Duan, S. Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang
{"title":"TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams","authors":"Kun Du, Hao Yang, Zhou Li, Haixin Duan, S. Hao, Baojun Liu, Yuxiao Ye, Mingxuan Liu, XiaoDong Su, Guang Liu, Zhifeng Geng, Zaifeng Zhang, Jinjin Liang","doi":"10.1007/978-3-030-37231-6_1","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_1","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Security of TRNGs Based on Multiple Ring Oscillators 基于多环振荡器的trng安全性研究
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_5
Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin
{"title":"On the Security of TRNGs Based on Multiple Ring Oscillators","authors":"Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin","doi":"10.1007/978-3-030-37231-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_5","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115607047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks 帐户锁定:描述和防止帐户拒绝服务攻击
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_2
Yu Liu, Matthew R. Squires, Curtis R. Taylor, R. Walls, Craig A. Shue
{"title":"Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks","authors":"Yu Liu, Matthew R. Squires, Curtis R. Taylor, R. Walls, Craig A. Shue","doi":"10.1007/978-3-030-37231-6_2","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_2","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait 基于虹膜特征块误差分布的可重用模糊提取器性能优化方法
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_14
Feng Zhu, P. Shen, Chi Chen
{"title":"A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait","authors":"Feng Zhu, P. Shen, Chi Chen","doi":"10.1007/978-3-030-37231-6_14","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_14","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131531650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Obfusifier: Obfuscation-Resistant Android Malware Detection System Obfusifier:抗混淆Android恶意软件检测系统
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_11
Zhiqiang Li, Jun Sun, Qiben Yan, W. Srisa-an, Yutaka Tsutano
{"title":"Obfusifier: Obfuscation-Resistant Android Malware Detection System","authors":"Zhiqiang Li, Jun Sun, Qiben Yan, W. Srisa-an, Yutaka Tsutano","doi":"10.1007/978-3-030-37228-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition 一种轻量级跨平台二值识别的欧式嵌入方法
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_16
Mengxia Luo, Can Yang, Xiaorui Gong, Lei-Ping Yu
{"title":"FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition","authors":"Mengxia Luo, Can Yang, Xiaorui Gong, Lei-Ping Yu","doi":"10.1007/978-3-030-37228-6_16","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_16","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"18 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network 反跟踪网络多径通信中消息分割与重构的容错机制
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37228-6_24
Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge
{"title":"A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network","authors":"Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge","doi":"10.1007/978-3-030-37228-6_24","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信