International Conference on Network and System Security最新文献

筛选
英文 中文
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation 基于神经特征学习和模型优化的无监督内幕检测
International Conference on Network and System Security Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-36938-5_2
Liu Liu, Chao Chen, Jun Zhang, O. Vel, Yang Xiang
{"title":"Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation","authors":"Liu Liu, Chao Chen, Jun Zhang, O. Vel, Yang Xiang","doi":"10.1007/978-3-030-36938-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-36938-5_2","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control SCARA:一种用于智能楼宇访问控制的云辅助RFID安全认证框架
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_15
Ahmed Raad Al-Sudani, Wanlei Zhou, S. Wen, Ahmed Al-Mansoori
{"title":"SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control","authors":"Ahmed Raad Al-Sudani, Wanlei Zhou, S. Wen, Ahmed Al-Mansoori","doi":"10.1007/978-3-030-02744-5_15","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_15","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks 射击一只鸽子并杀死一只乌鸦:关于链接洪水攻击的打击精度
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_32
Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu
{"title":"Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks","authors":"Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu","doi":"10.1007/978-3-030-02744-5_32","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_32","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the Behaviors of BGP-based DDoS Protection Services 了解基于bgp的DDoS防护服务的行为
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_34
T. Tung, Chenxu Wang, Jinhe Wang
{"title":"Understanding the Behaviors of BGP-based DDoS Protection Services","authors":"T. Tung, Chenxu Wang, Jinhe Wang","doi":"10.1007/978-3-030-02744-5_34","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_34","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"114 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating and Managing Realism in the Next-Generation Cyber Range 在下一代网络范围内创造和管理现实主义
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_33
Dragos Ionica, Florin Pop, Aniello Castiglione
{"title":"Creating and Managing Realism in the Next-Generation Cyber Range","authors":"Dragos Ionica, Florin Pop, Aniello Castiglione","doi":"10.1007/978-3-030-02744-5_33","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_33","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Relationship Classification of Facebook Messenger Mobile Data using WEKA 基于WEKA的Facebook Messenger移动数据的用户关系分类
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_25
Amber Umair, P. Nanda, Xiangjian He, Kim-Kwang Raymond Choo
{"title":"User Relationship Classification of Facebook Messenger Mobile Data using WEKA","authors":"Amber Umair, P. Nanda, Xiangjian He, Kim-Kwang Raymond Choo","doi":"10.1007/978-3-030-02744-5_25","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_25","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Burn After Reading: Expunging Execution Footprints of Android Apps 阅读后燃烧:删除Android应用程序的执行足迹
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_4
Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu
{"title":"Burn After Reading: Expunging Execution Footprints of Android Apps","authors":"Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu","doi":"10.1007/978-3-030-02744-5_4","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_4","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Study of Permission Usage on Android Android系统权限使用综合研究
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_5
Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo
{"title":"A Comprehensive Study of Permission Usage on Android","authors":"Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo","doi":"10.1007/978-3-030-02744-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_5","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud 加密云上基于二级索引的安全语义搜索
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_11
Lili Xia, Zhangjie Fu
{"title":"Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud","authors":"Lili Xia, Zhangjie Fu","doi":"10.1007/978-3-030-02744-5_11","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_11","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics 人脸生物识别安全应用快速四叉树姿态估计
International Conference on Network and System Security Pub Date : 2018-08-27 DOI: 10.1007/978-3-030-02744-5_12
Paola Barra, Carmen Bisogni, M. Nappi, S. Ricciardi
{"title":"Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics","authors":"Paola Barra, Carmen Bisogni, M. Nappi, S. Ricciardi","doi":"10.1007/978-3-030-02744-5_12","DOIUrl":"https://doi.org/10.1007/978-3-030-02744-5_12","url":null,"abstract":"","PeriodicalId":287438,"journal":{"name":"International Conference on Network and System Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信