International Standard Conference of Trustworthy Computing and Services最新文献

筛选
英文 中文
Hijacking Activity Technology Analysis and Research in Android System Android系统劫持活动技术分析与研究
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_6
Yunlong Ren, Yue Li, Fangfang Yuan, Fan Zhang
{"title":"Hijacking Activity Technology Analysis and Research in Android System","authors":"Yunlong Ren, Yue Li, Fangfang Yuan, Fan Zhang","doi":"10.1007/978-3-662-43908-1_6","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_6","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121940274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Concept of Service Trustworthiness Management System (STMS) 服务诚信管理体系(STMS)概念
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_46
Miandrilala, Yuyu Yuan
{"title":"Concept of Service Trustworthiness Management System (STMS)","authors":"Miandrilala, Yuyu Yuan","doi":"10.1007/978-3-662-43908-1_46","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_46","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127624092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting the DGA-Based Malicious Domain Names 基于dga的恶意域名检测
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_17
Y. Zhang, Yongzheng Zhang, Jun Xiao
{"title":"Detecting the DGA-Based Malicious Domain Names","authors":"Y. Zhang, Yongzheng Zhang, Jun Xiao","doi":"10.1007/978-3-662-43908-1_17","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_17","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Term Committee Based Event Identification and Dependency Discovery
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_40
Kuo Zhang, Juan-Zi Li, Gang Wu
{"title":"Term Committee Based Event Identification and Dependency Discovery","authors":"Kuo Zhang, Juan-Zi Li, Gang Wu","doi":"10.1007/978-3-662-43908-1_40","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_40","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130253728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Black-Box Approach for Detecting the Failure Traces 一种检测故障轨迹的黑盒方法
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_32
You Meng, Lang Yu, Zhongzhi Luan, D. Qian, Ming Xie, Zhigao Du
{"title":"A Black-Box Approach for Detecting the Failure Traces","authors":"You Meng, Lang Yu, Zhongzhi Luan, D. Qian, Ming Xie, Zhigao Du","doi":"10.1007/978-3-662-43908-1_32","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_32","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Covert Channel Bases on CPU Load in Cloud Computing 云计算中基于CPU负载的隐蔽信道
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_35
Li-Yu Daisy Liu, Qianwen He, Yu Zhang
{"title":"A Covert Channel Bases on CPU Load in Cloud Computing","authors":"Li-Yu Daisy Liu, Qianwen He, Yu Zhang","doi":"10.1007/978-3-662-43908-1_35","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_35","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Level Set Method Based Image Segmentation by Combining Local Information with Global Information 基于水平集的局部信息与全局信息相结合的图像分割方法
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_43
Cong Yang, Weiguo Wu, Yuanqi Su
{"title":"Level Set Method Based Image Segmentation by Combining Local Information with Global Information","authors":"Cong Yang, Weiguo Wu, Yuanqi Su","doi":"10.1007/978-3-662-43908-1_43","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_43","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gigabit Ethernet Data Transfer Based on FPGA 基于FPGA的千兆以太网数据传输
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_37
S. Zhou, Lin Yao
{"title":"Gigabit Ethernet Data Transfer Based on FPGA","authors":"S. Zhou, Lin Yao","doi":"10.1007/978-3-662-43908-1_37","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_37","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130713238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Risk Assessment of Mobile Internet Under Cloud Computing Mode 云计算模式下移动互联网安全风险评估
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_29
Luping Chen, Yongzheng Guo, Feng Zhou
{"title":"Security Risk Assessment of Mobile Internet Under Cloud Computing Mode","authors":"Luping Chen, Yongzheng Guo, Feng Zhou","doi":"10.1007/978-3-662-43908-1_29","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_29","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128899610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust and Trustworthiness in Human Behavior and IT Services - Concepts, Definitions and Relations 人类行为和信息技术服务中的信任和可信赖性——概念、定义和关系
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_31
J. Bøegh
{"title":"Trust and Trustworthiness in Human Behavior and IT Services - Concepts, Definitions and Relations","authors":"J. Bøegh","doi":"10.1007/978-3-662-43908-1_31","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_31","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信