International Conference on Advances in Security of Information and Communication Networks最新文献

筛选
英文 中文
NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study 评估网络攻击的影响。MANETs作为案例研究
L. Sánchez-Casado, R. Rodríguez-Gómez, Roberto Magán-Carrión, G. Maciá-Fernández
{"title":"NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study","authors":"L. Sánchez-Casado, R. Rodríguez-Gómez, Roberto Magán-Carrión, G. Maciá-Fernández","doi":"10.1007/978-3-642-40597-6_1","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_1","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115531256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Clustering Based Group Key Management for MANET 基于聚类的MANET组密钥管理
A. El-Sayed
{"title":"Clustering Based Group Key Management for MANET","authors":"A. El-Sayed","doi":"10.1007/978-3-642-40597-6_2","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_2","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130760231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Privacy Preserving Approach to Smart Metering 智能电表的隐私保护方法
M. Shinwari, A. Youssef, W. Hamouda
{"title":"A Privacy Preserving Approach to Smart Metering","authors":"M. Shinwari, A. Youssef, W. Hamouda","doi":"10.1007/978-3-642-40597-6_14","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_14","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132761471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing 零日蠕虫分析与对策测试的虚拟网络测试平台
K. Shahzad, Steve Woodhead, P. Bakalis
{"title":"A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing","authors":"K. Shahzad, Steve Woodhead, P. Bakalis","doi":"10.1007/978-3-642-40597-6_5","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_5","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Algebraic Replay Attacks on Authentication in RFID Protocols RFID协议认证中的代数重放攻击
N. Chikouche, Cherif Foudil, M. Benmohammed
{"title":"Algebraic Replay Attacks on Authentication in RFID Protocols","authors":"N. Chikouche, Cherif Foudil, M. Benmohammed","doi":"10.1007/978-3-642-40597-6_13","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_13","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"20 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132242347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing 使用自动黑盒和手动渗透测试检测Web应用程序中的漏洞
N. Awang, A. A. Manaf
{"title":"Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing","authors":"N. Awang, A. A. Manaf","doi":"10.1007/978-3-642-40597-6_20","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_20","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129910459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Linear Correlation-Based Feature Selection for Network Intrusion Detection Model 基于线性相关的网络入侵检测模型特征选择
F. Heba, A. Hassanien, Tai-hoon Kim, S. Banerjee
{"title":"Linear Correlation-Based Feature Selection for Network Intrusion Detection Model","authors":"F. Heba, A. Hassanien, Tai-hoon Kim, S. Banerjee","doi":"10.1007/978-3-642-40597-6_21","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_21","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132302000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study 漏洞扫描器功能检测Windows遗漏的补丁:比较研究
Mohamed Alfateh Badawy, N. El-Fishawy, Osama A. Elshakankiry
{"title":"Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study","authors":"Mohamed Alfateh Badawy, N. El-Fishawy, Osama A. Elshakankiry","doi":"10.1007/978-3-642-40597-6_16","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_16","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hardware Advancements Effects on MANET Development, Application and Research 硬件进步对MANET开发、应用和研究的影响
Amr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer
{"title":"Hardware Advancements Effects on MANET Development, Application and Research","authors":"Amr ElBanna, Ehab ElShafei, Khaled ElSabrouty, Marianne A. Azer","doi":"10.1007/978-3-642-40597-6_4","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_4","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131197373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Categorized Trust-Based Message Reporting Scheme for VANETs 一种基于信任的vanet分类消息报告方案
Merrihan B. Monir, Ayman A. Abdel-Hamid, Mohammed Abd El Aziz
{"title":"A Categorized Trust-Based Message Reporting Scheme for VANETs","authors":"Merrihan B. Monir, Ayman A. Abdel-Hamid, Mohammed Abd El Aziz","doi":"10.1007/978-3-642-40597-6_6","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_6","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信