Security and Privacy in Communication Networks最新文献

筛选
英文 中文
Authenticated LSM Trees with Minimal Trust 具有最小信任的认证LSM树
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_27
Y. Tang, Kai Li, Ju Chen
{"title":"Authenticated LSM Trees with Minimal Trust","authors":"Y. Tang, Kai Li, Ju Chen","doi":"10.1007/978-3-030-37231-6_27","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_27","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"672 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework 基于部分可观察蒙特卡罗规划框架的在线网络欺骗系统
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_11
Md Ali Reza Al Amin, S. Shetty, L. Njilla, Deepak K. Tosh, C. Kamhoua
{"title":"Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework","authors":"Md Ali Reza Al Amin, S. Shetty, L. Njilla, Deepak K. Tosh, C. Kamhoua","doi":"10.1007/978-3-030-37231-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_11","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123190839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hecate: Automated Customization of Program and Communication Features to Reduce Attack Surfaces Hecate:自动定制程序和通信功能,以减少攻击面
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_17
Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan
{"title":"Hecate: Automated Customization of Program and Communication Features to Reduce Attack Surfaces","authors":"Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan","doi":"10.1007/978-3-030-37231-6_17","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_17","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Behavior-Aware Profiling of Smart Contracts 智能合约的行为感知分析
Security and Privacy in Communication Networks Pub Date : 2019-10-23 DOI: 10.1007/978-3-030-37231-6_13
Xuetao Wei, Can Lu, F. Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang
{"title":"A Behavior-Aware Profiling of Smart Contracts","authors":"Xuetao Wei, Can Lu, F. Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang","doi":"10.1007/978-3-030-37231-6_13","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_13","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adversarial False Data Injection Attack Against Nonlinear AC State Estimation with ANN in Smart Grid 基于人工神经网络的智能电网非线性交流状态估计对抗假数据注入攻击
Security and Privacy in Communication Networks Pub Date : 2019-06-26 DOI: 10.1007/978-3-030-37231-6_21
Tian Liu, Tao Shu
{"title":"Adversarial False Data Injection Attack Against Nonlinear AC State Estimation with ANN in Smart Grid","authors":"Tian Liu, Tao Shu","doi":"10.1007/978-3-030-37231-6_21","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Maestro Attack: Orchestrating Malicious Flows with BGP 大师攻击:用BGP编排恶意流
Security and Privacy in Communication Networks Pub Date : 2019-05-19 DOI: 10.1007/978-3-030-63086-7_7
Tyler McDaniel, Jared M. Smith, Max Schuchard
{"title":"The Maestro Attack: Orchestrating Malicious Flows with BGP","authors":"Tyler McDaniel, Jared M. Smith, Max Schuchard","doi":"10.1007/978-3-030-63086-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-63086-7_7","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains 公共区块链对不可信云存储的安全一致性验证
Security and Privacy in Communication Networks Pub Date : 2019-04-14 DOI: 10.1007/978-3-030-37228-6_3
Kai Li, Y. Tang, Beom Heyn Kim, Jianliang Xu
{"title":"Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains","authors":"Kai Li, Y. Tang, Beom Heyn Kim, Jianliang Xu","doi":"10.1007/978-3-030-37228-6_3","DOIUrl":"https://doi.org/10.1007/978-3-030-37228-6_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications IIFA: Android应用间的模块化意图信息流分析
Security and Privacy in Communication Networks Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-37231-6_19
A. Tiwari, S. Groß, Christian Hammer
{"title":"IIFA: Modular Inter-app Intent Information Flow Analysis of Android Applications","authors":"A. Tiwari, S. Groß, Christian Hammer","doi":"10.1007/978-3-030-37231-6_19","DOIUrl":"https://doi.org/10.1007/978-3-030-37231-6_19","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Xilara: An XSS Filter Based on HTML Template Restoration Xilara:一个基于HTML模板还原的XSS过滤器
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_18
Keitaro Yamazaki, Daisuke Kotani, Y. Okabe
{"title":"Xilara: An XSS Filter Based on HTML Template Restoration","authors":"Keitaro Yamazaki, Daisuke Kotani, Y. Okabe","doi":"10.1007/978-3-030-01704-0_18","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_18","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of Big Data Security Solutions in Healthcare 医疗保健领域大数据安全解决方案调查
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_21
M. Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, J. Chaudhry, R. Islam
{"title":"A Survey of Big Data Security Solutions in Healthcare","authors":"M. Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, J. Chaudhry, R. Islam","doi":"10.1007/978-3-030-01704-0_21","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_21","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信