International Conference on Network and System Security最新文献

筛选
英文 中文
Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain b区块链上基于理性用户行为的去中心化结构难以实现
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_31
Mitsuyoshi Imamura, Kazumasa Omote
{"title":"Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain","authors":"Mitsuyoshi Imamura, Kazumasa Omote","doi":"10.1007/978-3-030-36938-5_31","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_31","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Multi-attributes-Based Trust Model of Internet of Vehicle 基于多属性的车联网信任模型
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_45
Wei Ou, Entao Luo, Zhiyuan Tan, Lihong Xiang, Qin Yi, Chen Tian
{"title":"A Multi-attributes-Based Trust Model of Internet of Vehicle","authors":"Wei Ou, Entao Luo, Zhiyuan Tan, Lihong Xiang, Qin Yi, Chen Tian","doi":"10.1007/978-3-030-36938-5_45","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_45","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132930485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration 一种基于深度学习模型防止数据泄露的DNS隧道检测方法
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_32
Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma
{"title":"A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration","authors":"Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma","doi":"10.1007/978-3-030-36938-5_32","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_32","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Graph Database-Based Approach to Analyze Network Log Files 基于图数据库的网络日志文件分析方法
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_4
Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac
{"title":"A Graph Database-Based Approach to Analyze Network Log Files","authors":"Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac","doi":"10.1007/978-3-030-36938-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_4","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125781354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT 基于区块链的所有者控制的资源受限物联网安全软件更新
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_22
G. Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks
{"title":"Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT","authors":"G. Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks","doi":"10.1007/978-3-030-36938-5_22","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_22","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130317504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Threat Assessment of Enterprise Applications via Graphical Modelling 基于图形化建模的企业应用威胁评估
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_9
Manjunath Bilur, Anugrah Gari, R. Shyamasundar
{"title":"Threat Assessment of Enterprise Applications via Graphical Modelling","authors":"Manjunath Bilur, Anugrah Gari, R. Shyamasundar","doi":"10.1007/978-3-030-36938-5_9","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_9","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"37 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptanalysis of Raindrop and FBC 雨滴和FBC的密码分析
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_33
Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, K. Liang
{"title":"Cryptanalysis of Raindrop and FBC","authors":"Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, K. Liang","doi":"10.1007/978-3-030-36938-5_33","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_33","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131048336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EEG-Based Person Authentication with Variational Universal Background Model 基于变分通用背景模型的脑电图身份验证
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_25
Huyen Tran, D. Tran, Wanli Ma, Phuoc Nguyen
{"title":"EEG-Based Person Authentication with Variational Universal Background Model","authors":"Huyen Tran, D. Tran, Wanli Ma, Phuoc Nguyen","doi":"10.1007/978-3-030-36938-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_25","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study on Network Traffic Clustering 网络流量聚类的比较研究
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_27
Yang Liu, Hanxiao Xue, Guochen Wei, Lisu Wu, Yu Wang
{"title":"A Comparative Study on Network Traffic Clustering","authors":"Yang Liu, Hanxiao Xue, Guochen Wei, Lisu Wu, Yu Wang","doi":"10.1007/978-3-030-36938-5_27","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_27","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132065081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost 基于防御成本的比特币矿池DDoS攻击新博弈论分析
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_35
Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou
{"title":"New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost","authors":"Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou","doi":"10.1007/978-3-030-36938-5_35","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_35","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128169063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信