Security and Privacy in Communication Networks最新文献

筛选
英文 中文
Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain 在使用区块链的能源输送系统中建立可靠和负责任的网络供应链
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_3
Xueping Liang, S. Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li
{"title":"Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain","authors":"Xueping Liang, S. Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li","doi":"10.1007/978-3-030-01704-0_3","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_3","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure Communication on NoC Based MPSoC 基于NoC的MPSoC的安全通信
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_23
G. Sharma, Soultana Ellinidou, Veronika Kuchta, R. Sahu, O. Markowitch, J. Dricot
{"title":"Secure Communication on NoC Based MPSoC","authors":"G. Sharma, Soultana Ellinidou, Veronika Kuchta, R. Sahu, O. Markowitch, J. Dricot","doi":"10.1007/978-3-030-01704-0_23","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_23","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Detecting Suspicious Members in an Online Emotional Support Service 在在线情感支持服务中发现可疑成员
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_2
Yu Li, D. Kim, Junjie Zhang, Derek Doran
{"title":"Detecting Suspicious Members in an Online Emotional Support Service","authors":"Yu Li, D. Kim, Junjie Zhang, Derek Doran","doi":"10.1007/978-3-030-01704-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_2","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132662440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables 物以类聚:智能可穿戴设备的模糊提取和基于步态的鲁棒组密钥生成
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_19
C. Javali, G. Revadigar
{"title":"Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables","authors":"C. Javali, G. Revadigar","doi":"10.1007/978-3-030-01701-9_19","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_19","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism 连续的网络激进化:从个人表达不满到他们转变为极端主义
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_24
Yeslam Al‐Saggaf
{"title":"Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism","authors":"Yeslam Al‐Saggaf","doi":"10.1007/978-3-030-01704-0_24","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129764471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring UI States of Mobile Applications Through Power Side Channel Exploitation 通过功率侧信道开发推断移动应用的用户界面状态
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_12
Yao Guo, Junming Ma, Wenjun Wu, Xiangqun Chen
{"title":"Inferring UI States of Mobile Applications Through Power Side Channel Exploitation","authors":"Yao Guo, Junming Ma, Wenjun Wu, Xiangqun Chen","doi":"10.1007/978-3-030-01701-9_12","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_12","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Bot Detection Using Tweets Similarity 使用推文相似性的社交机器人检测
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_4
Yahan Wang, Chunhua Wu, K. Zheng, Xiujuan Wang
{"title":"Social Bot Detection Using Tweets Similarity","authors":"Yahan Wang, Chunhua Wu, K. Zheng, Xiujuan Wang","doi":"10.1007/978-3-030-01704-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_4","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"23 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Malware Detection for Healthcare Data Security 针对医疗数据安全的恶意软件检测
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01704-0_22
Mozammel Chowdhury, Sharmin Jahan, R. Islam, Junbin Gao
{"title":"Malware Detection for Healthcare Data Security","authors":"Mozammel Chowdhury, Sharmin Jahan, R. Islam, Junbin Gao","doi":"10.1007/978-3-030-01704-0_22","DOIUrl":"https://doi.org/10.1007/978-3-030-01704-0_22","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware 一种研究领域生成算法(DGA)恶意软件的机器学习框架
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_24
Tommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li
{"title":"A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware","authors":"Tommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li","doi":"10.1007/978-3-030-01701-9_24","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_24","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks 解锁身份:为移动自组织网络中的Sybil节点定价
Security and Privacy in Communication Networks Pub Date : 2018-08-08 DOI: 10.1007/978-3-030-01701-9_20
Arne Bochem, Benjamin Leiding, D. Hogrefe
{"title":"Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks","authors":"Arne Bochem, Benjamin Leiding, D. Hogrefe","doi":"10.1007/978-3-030-01701-9_20","DOIUrl":"https://doi.org/10.1007/978-3-030-01701-9_20","url":null,"abstract":"","PeriodicalId":269657,"journal":{"name":"Security and Privacy in Communication Networks","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127094564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信