Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2022
Character-level domain name generation algorithm based on ED-GAN
ICSCA '22: Proceedings of the 2022 11th International Conference on Software and Computer ApplicationsPages 198–205https://doi.org/10.1145/3524304.3524333In response to the need to obtain the latest counterfeit domain name samples in time to prevent new counterfeit domain name attacks in high-level security requirement scenarios, this chapter proposes a character-level domain name generation method based ...
- research-articleJune 2022
Trusted connection architecture of electric IoT
ICSCA '22: Proceedings of the 2022 11th International Conference on Software and Computer ApplicationsPages 129–135https://doi.org/10.1145/3524304.3524324At present, when smart electricity terminals request access to the edge computing network, it often directly uses the traditional access authentication method. In contrast, it is challenging to prevent the malicious access of untrusted electricity IoT ...
- research-articleJune 2022
Consensus Algorithm Based on Subject Credit
ICSCA '22: Proceedings of the 2022 11th International Conference on Software and Computer ApplicationsPages 108–115https://doi.org/10.1145/3524304.3524321The efficiency of the existing PBFT consensus algorithm in the alliance chain will become very low after the network nodes reach a certain scale, and the number of nodes in the network is fixed and lack of dynamics. Because food merchants need to be ...
- research-articleJune 2022
Fast identification method of malicious code based on extreme learning machine
ICSCA '22: Proceedings of the 2022 11th International Conference on Software and Computer ApplicationsPages 55–60https://doi.org/10.1145/3524304.3524312A data balancing strategy based on conditional generative confrontation network and particle swarm algorithm can effectively improve the model's ability to detect malicious code. Nonetheless for some malicious code families with similar characteristics, ...