International Conference on Computer Network Security and Software Engineering (CNSSE 2023)最新文献

筛选
英文 中文
Automatic generation of security policy based on standardized security configuration 基于标准化安全配置自动生成安全策略
Zesheng Xi, Bo Zhang, Bo Zhou, xiangyu zhong, Juan Zhou
{"title":"Automatic generation of security policy based on standardized security configuration","authors":"Zesheng Xi, Bo Zhang, Bo Zhou, xiangyu zhong, Juan Zhou","doi":"10.1117/12.2683197","DOIUrl":"https://doi.org/10.1117/12.2683197","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127212431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An admission control method for CAN networks based on voltage fingerprinting 一种基于电压指纹的CAN网络准入控制方法
Ling Zhang, Hao Han
{"title":"An admission control method for CAN networks based on voltage fingerprinting","authors":"Ling Zhang, Hao Han","doi":"10.1117/12.2683585","DOIUrl":"https://doi.org/10.1117/12.2683585","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123747186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of computer network secure storage system based on big data clustering algorithm 基于大数据聚类算法的计算机网络安全存储系统设计
Kexin Zhu
{"title":"Design of computer network secure storage system based on big data clustering algorithm","authors":"Kexin Zhu","doi":"10.1117/12.2683165","DOIUrl":"https://doi.org/10.1117/12.2683165","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122604201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abnormal behavior detection of ships in river T-intersection area based on shore-based surveillance radar data 基于岸基监视雷达数据的河流t型交叉口区域船舶异常行为检测
Kun Xu, L. Xia
{"title":"Abnormal behavior detection of ships in river T-intersection area based on shore-based surveillance radar data","authors":"Kun Xu, L. Xia","doi":"10.1117/12.2683218","DOIUrl":"https://doi.org/10.1117/12.2683218","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128762633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TEN: temporal excitation network for video action recognition 用于视频动作识别的时间激励网络
Dengdi Sun, Zhenhao He, Bin Luo, Zhuanlian Ding
{"title":"TEN: temporal excitation network for video action recognition","authors":"Dengdi Sun, Zhenhao He, Bin Luo, Zhuanlian Ding","doi":"10.1117/12.2683421","DOIUrl":"https://doi.org/10.1117/12.2683421","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121272056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical control machining error compensation technology based on three-coordinate calibration 基于三坐标标定的数控加工误差补偿技术
Yihan Wang
{"title":"Numerical control machining error compensation technology based on three-coordinate calibration","authors":"Yihan Wang","doi":"10.1117/12.2683563","DOIUrl":"https://doi.org/10.1117/12.2683563","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114684683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and countermeasures of campus network security protection under IPV6 architecture IPV6架构下校园网安全防护分析及对策
Shaoqiang Li, Guangyu Wu, Allam Maalla
{"title":"Analysis and countermeasures of campus network security protection under IPV6 architecture","authors":"Shaoqiang Li, Guangyu Wu, Allam Maalla","doi":"10.1117/12.2683180","DOIUrl":"https://doi.org/10.1117/12.2683180","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121913991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic moving target defense strategy based on adaptive port hopping in SDN 基于自适应端口跳变的SDN动态运动目标防御策略
Fangfang Dang, Kehe Wu, Shuai Li, Han Liu, Yifan Song, Xiaoliang Zhang
{"title":"Dynamic moving target defense strategy based on adaptive port hopping in SDN","authors":"Fangfang Dang, Kehe Wu, Shuai Li, Han Liu, Yifan Song, Xiaoliang Zhang","doi":"10.1117/12.2683442","DOIUrl":"https://doi.org/10.1117/12.2683442","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130897463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program completeness verification mechanism based on static analysis 基于静态分析的程序完整性验证机制
Wen Zhou, Hanyu Meng, Yi Shi, Le Luo, Jingyi Yang
{"title":"Program completeness verification mechanism based on static analysis","authors":"Wen Zhou, Hanyu Meng, Yi Shi, Le Luo, Jingyi Yang","doi":"10.1117/12.2683176","DOIUrl":"https://doi.org/10.1117/12.2683176","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128445331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of the audio security system based on Internet of Things 基于物联网的音频安防系统设计
Wenbin Li, Jing Kang, Yuxin Liao
{"title":"Design of the audio security system based on Internet of Things","authors":"Wenbin Li, Jing Kang, Yuxin Liao","doi":"10.1117/12.2683185","DOIUrl":"https://doi.org/10.1117/12.2683185","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121792413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信