International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage最新文献

筛选
英文 中文
Multi-round Bidding Strategy Based on Game Theory for Crowdsensing Task 基于博弈论的众感任务多轮投标策略
E. Wang, Yongjian Yang, Jie Wu, Hengzhi Wang
{"title":"Multi-round Bidding Strategy Based on Game Theory for Crowdsensing Task","authors":"E. Wang, Yongjian Yang, Jie Wu, Hengzhi Wang","doi":"10.1007/978-3-030-24907-6_16","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_16","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121139706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Construction of Malware Families 恶意软件家族的自动构建
Krishnendu Ghosh, Jeffery Mills
{"title":"Automated Construction of Malware Families","authors":"Krishnendu Ghosh, Jeffery Mills","doi":"10.1007/978-3-030-24907-6_35","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_35","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134540873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Closer Look at Anonymous Proxy Re-Encryption Schemes 仔细研究匿名代理重新加密方案
S. S. D. Selvi, S. Harish, S. Dhanabal, C. Rangan
{"title":"A Closer Look at Anonymous Proxy Re-Encryption Schemes","authors":"S. S. D. Selvi, S. Harish, S. Dhanabal, C. Rangan","doi":"10.1007/978-3-030-24907-6_36","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_36","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131489591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes 一种基于加密的方法来保护雾联盟免受流氓节点的攻击
Mohammed S. Alshehri, B. Panda
{"title":"An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes","authors":"Mohammed S. Alshehri, B. Panda","doi":"10.1007/978-3-030-24907-6_18","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_18","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132875039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation Industry 自动化工业中时间敏感软件定义网络(TSSDN)的挑战和未来方向
Ng Kean Haur, T. S. Chin
{"title":"Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation Industry","authors":"Ng Kean Haur, T. S. Chin","doi":"10.1007/978-3-030-24907-6_24","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_24","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Machine Learning to Find Anomalies in Field Bus Network Traffic 使用机器学习发现现场总线网络流量中的异常
Martin Peters, Johannes Goltz, Simeon Wiedenmann, T. Mundt
{"title":"Using Machine Learning to Find Anomalies in Field Bus Network Traffic","authors":"Martin Peters, Johannes Goltz, Simeon Wiedenmann, T. Mundt","doi":"10.1007/978-3-030-24907-6_26","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_26","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning 基于视觉分析和机器学习的H-SDN流量分析
Tze Chiang Tin, S. C. Tan, C. K. Lee, Y. Zulfadzli, K. Rizaludin
{"title":"Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning","authors":"Tze Chiang Tin, S. C. Tan, C. K. Lee, Y. Zulfadzli, K. Rizaludin","doi":"10.1007/978-3-030-24907-6_10","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_10","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128906859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End Encryption Schemes for Online Social Networks 在线社交网络的端到端加密方案
Fabian Schillinger, C. Schindelhauer
{"title":"End-to-End Encryption Schemes for Online Social Networks","authors":"Fabian Schillinger, C. Schindelhauer","doi":"10.1007/978-3-030-24907-6_11","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_11","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"476 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116414358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Topic Model Based Android Malware Detection 基于主题模型的Android恶意软件检测
Yucai Song, Yang Chen, Bo Lang, Hongyu Liu, Shaojie Chen
{"title":"Topic Model Based Android Malware Detection","authors":"Yucai Song, Yang Chen, Bo Lang, Hongyu Liu, Shaojie Chen","doi":"10.1007/978-3-030-24907-6_29","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_29","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134619830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effectiveness of Machine Learning Based Intrusion Detection Systems 基于机器学习的入侵检测系统的有效性
Mohammed Alrowaily, Freeh Alenezi, Zhuo Lu
{"title":"Effectiveness of Machine Learning Based Intrusion Detection Systems","authors":"Mohammed Alrowaily, Freeh Alenezi, Zhuo Lu","doi":"10.1007/978-3-030-24907-6_21","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_21","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信