International Conference on Computer Network Security and Software Engineering (CNSSE 2023)最新文献

筛选
英文 中文
Docker-based security protection system for container applications 基于docker的容器应用安全防护系统
Chen Wang, Sheng-yu Zhu, Weiwei Li
{"title":"Docker-based security protection system for container applications","authors":"Chen Wang, Sheng-yu Zhu, Weiwei Li","doi":"10.1117/12.2683171","DOIUrl":"https://doi.org/10.1117/12.2683171","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124526627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and application of unmanned aerial vehicle control platform for electric power infrastructure 电力基础设施无人机控制平台的研究与应用
H. Xu, Z. Tang, Shuoyin Kong, Yechi Xu, Songyang Che, Fei Guo
{"title":"Research and application of unmanned aerial vehicle control platform for electric power infrastructure","authors":"H. Xu, Z. Tang, Shuoyin Kong, Yechi Xu, Songyang Che, Fei Guo","doi":"10.1117/12.2683285","DOIUrl":"https://doi.org/10.1117/12.2683285","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P2P based on network behavior analysis trust value calculation method 基于P2P网络行为分析的信任值计算方法
Xingeng Zeng, X. Yu
{"title":"P2P based on network behavior analysis trust value calculation method","authors":"Xingeng Zeng, X. Yu","doi":"10.1117/12.2683177","DOIUrl":"https://doi.org/10.1117/12.2683177","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130919923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SQLDAF: SQL injection attack active defense system based on randomized method pool SQLDAF:基于随机方法池的SQL注入攻击主动防御系统
Anqi Wang, Bei Yang, Jianhui Zhang, Yongxu Xing
{"title":"SQLDAF: SQL injection attack active defense system based on randomized method pool","authors":"Anqi Wang, Bei Yang, Jianhui Zhang, Yongxu Xing","doi":"10.1117/12.2683433","DOIUrl":"https://doi.org/10.1117/12.2683433","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on visual recognition method of distribution network grounding ring 配电网接地环视觉识别方法研究
Qiuyan Zhang, Shuzhou Xiao, Ruyun Huang, Ruifeng Zhang, Peng Zeng
{"title":"Research on visual recognition method of distribution network grounding ring","authors":"Qiuyan Zhang, Shuzhou Xiao, Ruyun Huang, Ruifeng Zhang, Peng Zeng","doi":"10.1117/12.2683182","DOIUrl":"https://doi.org/10.1117/12.2683182","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123433258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECOPY: Data-free model stealing for deep neural network ECOPY:深度神经网络的无数据模型窃取
Weilun Qin, Zijiao Zhang, Yufei Xie, Lin Zhu
{"title":"ECOPY: Data-free model stealing for deep neural network","authors":"Weilun Qin, Zijiao Zhang, Yufei Xie, Lin Zhu","doi":"10.1117/12.2683207","DOIUrl":"https://doi.org/10.1117/12.2683207","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129805327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on comprehensive dispatching of earthquake relief based on emergency management 基于应急管理的地震救援综合调度研究
Pengfei Wang, Yongqiang Liu, Yudong Fang, Xiaohui Li, Zhen Huang, Ming Xue, Lu Lu
{"title":"Research on comprehensive dispatching of earthquake relief based on emergency management","authors":"Pengfei Wang, Yongqiang Liu, Yudong Fang, Xiaohui Li, Zhen Huang, Ming Xue, Lu Lu","doi":"10.1117/12.2683281","DOIUrl":"https://doi.org/10.1117/12.2683281","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A big data technology for computer intrusion detection 计算机入侵检测的大数据技术
Jin Shuguang
{"title":"A big data technology for computer intrusion detection","authors":"Jin Shuguang","doi":"10.1117/12.2683581","DOIUrl":"https://doi.org/10.1117/12.2683581","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133987613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intrusion detection system for container cloud via graph translation and short sequence mapping of system call traces 基于图转换和系统调用轨迹短序列映射的容器云入侵检测系统
Zhonglei Chen, Peng Yi, Xiang Chen, Tao Hu
{"title":"An intrusion detection system for container cloud via graph translation and short sequence mapping of system call traces","authors":"Zhonglei Chen, Peng Yi, Xiang Chen, Tao Hu","doi":"10.1117/12.2683193","DOIUrl":"https://doi.org/10.1117/12.2683193","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and application of geological laboratory information management system 地质实验室信息管理系统的开发与应用
Yuqian Zhang, Jianwei Zhao, J. Li, Shuang Sun, Wenning Ma, Qiyue Yin, Wenrong Liu
{"title":"Development and application of geological laboratory information management system","authors":"Yuqian Zhang, Jianwei Zhao, J. Li, Shuang Sun, Wenning Ma, Qiyue Yin, Wenrong Liu","doi":"10.1117/12.2683188","DOIUrl":"https://doi.org/10.1117/12.2683188","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信