International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage最新文献

筛选
英文 中文
E ^2 STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks E ^2 STA:一种高效的无线传感器网络时空查询算法
Liang Liu, Zhe Xu, Yi-Ting Wang, X. Qin
{"title":"E ^2 STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks","authors":"Liang Liu, Zhe Xu, Yi-Ting Wang, X. Qin","doi":"10.1007/978-3-030-05345-1_45","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_45","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing SafeTECKS:通过知识共享保护物联网边缘云架构中的数据安全
S. Huang, Weifeng Lv, Zhipu Xie, Bo Huang, Bowen Du
{"title":"SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing","authors":"S. Huang, Weifeng Lv, Zhipu Xie, Bo Huang, Bowen Du","doi":"10.1007/978-3-030-05345-1_28","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_28","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126469683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication 基于预复制的高性能容器检查点自适应策略
Shuo Zhang, Ningjiang Chen, Hanlin Zhang, Yijun Xue, Ruwei Huang
{"title":"A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication","authors":"Shuo Zhang, Ningjiang Chen, Hanlin Zhang, Yijun Xue, Ruwei Huang","doi":"10.1007/978-3-030-05345-1_20","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_20","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129414670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning 基于深度学习的双圆锥滚子轴承安全检测
Jie Tao, Shaobo Zhang, Da-lian Yang
{"title":"The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning","authors":"Jie Tao, Shaobo Zhang, Da-lian Yang","doi":"10.1007/978-3-030-05345-1_42","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_42","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"22 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131991364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Risk Identification-Based Association Rule Mining for Supply Chain Big Data 基于风险识别的供应链大数据关联规则挖掘
A. Salamai, Morteza Saberi, Md. Omar Khadeer Hussain, Elizabeth Chang
{"title":"Risk Identification-Based Association Rule Mining for Supply Chain Big Data","authors":"A. Salamai, Morteza Saberi, Md. Omar Khadeer Hussain, Elizabeth Chang","doi":"10.1007/978-3-030-05345-1_18","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_18","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114053975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics 基于时钟特性的机器学习识别物联网设备
Pascal Oser, F. Kargl, S. Lüders
{"title":"Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics","authors":"Pascal Oser, F. Kargl, S. Lüders","doi":"10.1007/978-3-030-05345-1_36","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_36","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective 物流均衡配送网络系统综述:城市视角
Wang Wei, M. A. Rahman, Md Jahan Ali, Md. Zakirul Alam Bhuiyan, Liu Yao, Hai Tao
{"title":"Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective","authors":"Wang Wei, M. A. Rahman, Md Jahan Ali, Md. Zakirul Alam Bhuiyan, Liu Yao, Hai Tao","doi":"10.1007/978-3-030-05345-1_24","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_24","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SDN-Based Secure VANETs Communication with Fog Computing 基于sdn的安全vanet通信与雾计算
Muhammad Arif, Guojun Wang, Tian Wang, Tao Peng
{"title":"SDN-Based Secure VANETs Communication with Fog Computing","authors":"Muhammad Arif, Guojun Wang, Tian Wang, Tao Peng","doi":"10.1007/978-3-030-05345-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_4","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122135391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals 利用Wi-Fi信号进行非法监视人类活动的调查
Md. Zakirul Alam Bhuiyan, Md. Monirul Islam, Guojun Wang, Tian Wang
{"title":"Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals","authors":"Md. Zakirul Alam Bhuiyan, Md. Monirul Islam, Guojun Wang, Tian Wang","doi":"10.1007/978-3-030-05345-1_44","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_44","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TrCMP: An App Usage Inference Method for Mobile Service Enhancement TrCMP:一种用于移动业务增强的应用程序使用推断方法
Xuan Zhao, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique, Wanchun Dou
{"title":"TrCMP: An App Usage Inference Method for Mobile Service Enhancement","authors":"Xuan Zhao, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Hongli Nie, Wajid Rafique, Wanchun Dou","doi":"10.1007/978-3-030-05345-1_19","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_19","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126480348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信