International Conference on Network and System Security最新文献

筛选
英文 中文
Area-Dividing Route Mutation in Moving Target Defense Based on SDN 基于SDN的运动目标防御中的区域划分路由突变
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_43
Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang
{"title":"Area-Dividing Route Mutation in Moving Target Defense Based on SDN","authors":"Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang","doi":"10.1007/978-3-319-64701-2_43","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_43","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"125 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120871185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Formal Approach for Network Security Policy Relevancy Checking 网络安全策略相关性检验的形式化方法
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_42
Fakher Ben Ftima, K. Karoui, H. Ghézala
{"title":"A Formal Approach for Network Security Policy Relevancy Checking","authors":"Fakher Ben Ftima, K. Karoui, H. Ghézala","doi":"10.1007/978-3-319-64701-2_42","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_42","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Detecting Method of Array Bounds Defects Based on Symbolic Execution 基于符号执行的数组边界缺陷检测方法
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_27
Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu
{"title":"A Detecting Method of Array Bounds Defects Based on Symbolic Execution","authors":"Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu","doi":"10.1007/978-3-319-64701-2_27","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_27","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114220217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things 工业物联网智能传感器的硬件安全、基于密码的认证
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_50
Thomas W. Pieber, Thomas Ulz, C. Steger, R. Matischek
{"title":"Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things","authors":"Thomas W. Pieber, Thomas Ulz, C. Steger, R. Matischek","doi":"10.1007/978-3-319-64701-2_50","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_50","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131125887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme 基于身份的代理多重签名方案的密码分析与改进
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_21
J. Kar
{"title":"Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme","authors":"J. Kar","doi":"10.1007/978-3-319-64701-2_21","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_21","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"25 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet 利用双向哈希链增强KPS弹性及其在传感器网络上的应用
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_54
Deepak Kumar Dalai, Pinaki Sarkar
{"title":"Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet","authors":"Deepak Kumar Dalai, Pinaki Sarkar","doi":"10.1007/978-3-319-64701-2_54","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_54","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133863888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Optimal Attack Path Generation Based on Supervised Kohonen Neural Network 基于监督Kohonen神经网络的最优攻击路径生成
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_29
Yun Chen, Kun Lv, Changzhen Hu
{"title":"Optimal Attack Path Generation Based on Supervised Kohonen Neural Network","authors":"Yun Chen, Kun Lv, Changzhen Hu","doi":"10.1007/978-3-319-64701-2_29","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_29","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114732141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Subscriber Profile Extraction and Modification via Diameter Interconnection 通过直径互连提取和修改用户配置文件
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_45
S. Holtmanns, Y. Miché, Ian Oliver
{"title":"Subscriber Profile Extraction and Modification via Diameter Interconnection","authors":"S. Holtmanns, Y. Miché, Ian Oliver","doi":"10.1007/978-3-319-64701-2_45","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_45","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies 焦点:用于交换去中心化加密货币的去中心化无信任平台
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_53
Michal Zima
{"title":"Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies","authors":"Michal Zima","doi":"10.1007/978-3-319-64701-2_53","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_53","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IPsec and IKE as Functions in SDN Controlled Network IPsec和IKE在SDN控制网络中的作用
International Conference on Network and System Security Pub Date : 2017-08-21 DOI: 10.1007/978-3-319-64701-2_39
Markku Vajaranta, Joona Kannisto, J. Harju
{"title":"IPsec and IKE as Functions in SDN Controlled Network","authors":"Markku Vajaranta, Joona Kannisto, J. Harju","doi":"10.1007/978-3-319-64701-2_39","DOIUrl":"https://doi.org/10.1007/978-3-319-64701-2_39","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121033614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信