{"title":"Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique","authors":"Yasir F. Mohammed, D. Thompson","doi":"10.1007/978-3-030-24907-6_8","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_8","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates","authors":"Tasnuva Mahjabin, Yang Xiao","doi":"10.1007/978-3-030-24907-6_22","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_22","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116308815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection","authors":"Lena Ara, Xiao Luo","doi":"10.1007/978-3-030-24907-6_9","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_9","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guosheng Xu, Zhimin Wu, Chengze Li, Jinghua Yan, Jing Yuan, Zhiyong Wang, Lu Wang
{"title":"Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching","authors":"Guosheng Xu, Zhimin Wu, Chengze Li, Jinghua Yan, Jing Yuan, Zhiyong Wang, Lu Wang","doi":"10.1007/978-3-030-24907-6_25","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_25","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114168740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yubao Wu, Fengpan Zhao, Xucan Chen, P. Skums, Eric L. Sevigny, David Maimon, Marie Ouellet, M. Swahn, S. Strasser, M. Feizollahi, Youfang Zhang, Gunjan Sekhon
{"title":"Python Scrapers for Scraping Cryptomarkets on Tor","authors":"Yubao Wu, Fengpan Zhao, Xucan Chen, P. Skums, Eric L. Sevigny, David Maimon, Marie Ouellet, M. Swahn, S. Strasser, M. Feizollahi, Youfang Zhang, Gunjan Sekhon","doi":"10.1007/978-3-030-24907-6_19","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_19","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Application-Layer Tunnels with Rules and Machine Learning","authors":"Huaqing Lin, Gao Liu, Zheng Yan","doi":"10.1007/978-3-030-24907-6_33","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_33","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling Security Requirements for Software Development with Common Criteria","authors":"Naseer Amara, Zhiqui Huang, Awais Ali","doi":"10.1007/978-3-030-24907-6_7","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_7","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring Data Integrity in Fog Computing Based Health-Care Systems","authors":"Abdulwahab Alazeb, B. Panda","doi":"10.1007/978-3-030-24907-6_6","DOIUrl":"https://doi.org/10.1007/978-3-030-24907-6_6","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}