default search action
8th ICCNS 2018: Qingdao, China
- Proceedings of the 8th International Conference on Communication and Network Security, ICCNS 2018, Qingdao, China, November 02-04, 2018. ACM 2018, ISBN 978-1-4503-6567-3
Cyber attack and defense strategy
- Mohammad Hashem Haghighat, Jun Li:
Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data. 1-6 - Xinli Xiong, Weiguang Xu, Guangsheng Zhao:
The Effectiveness Assessment for Network Based MTD Strategies. 7-11 - Xiaoming Hu, Wenrong Jiang, Chuang Ma, Chengcheng Yu:
Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme. 12-16 - Guangsheng Zhao, Xinli Xiong, Huaying Wu:
A Model for Analyzing the Effectiveness of Moving Target Defense. 17-21 - Yongchao Wang, Yuyan Chao, Lifeng He:
A Study of Neighbor Users Selection in Email Networks for Spam Filtering. 22-26 - Shijin Li, Minchen Zhu, Yanbin Qiu:
Attack Intent Analysis Method Based on Attack Path Graph. 27-31 - Yanbin Qiu, Yanhua Liu, Shijin Li:
A method of cyber risk control node selection based on Game Theory. 32-36 - Peihuang Su, Yanhua Liu, Xiang Song:
Research on Intrusion Detection Method Based on Improved Smote and XGBoost. 37-41
Network and data security
- Haonan Sun, Rongyu He:
Certification and remote attestation methods of the eTPM trusted cloud. 42-49 - Athmane Seghier:
Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes. 50-55 - Yikun Jiang, Wei Xie, Yong Tang:
Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers. 56-63 - Jianfeng Zhao:
Case Study: Discovering Hardware Trojans Based on model checking. 64-68 - Xiaojian Liu, Xiaofeng Dong, Qian Lei:
Android Malware Detection Based on Multi-Features. 69-73 - Cangshuai Wu, Jiangyong Shi, Yuexiang Yang, Wenhua Li:
Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning. 74-78 - Mengli Zhang, Qihui Zhang, Xuexian Hu, Wenfen Liu:
A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network. 79-83 - Yuxuan Zhang, Jianghong Wei, Xiaojian Zhang, Xuexian Hu, Wenfen Liu:
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy. 84-89
Communication network and signal processing
- Shiyu Shen, Jianlin Gao, Aitian Wu:
Weakness Identification and Flow Analysis Based on Tor Network. 90-94 - Yunfang Chen, Que Wu, Wei Zhang, Qiangchun Liu:
SD-WAN Source Route Based on Protocol-oblivious Forwarding. 95-99 - Gangcan Sun, Mengge Liu, Zhuo Han:
Multiple Eavesdropper-Based Physical Layer Security in TAS/MRC System With Antenna Correlation. 100-106 - Xiaodong Bai, Wendeng Zhu, Gengxin Zhang, Tao Hong, Laiding Zhao, Jing Hu:
Identification Method of Power Spectral Signal Based on Fourier Series Fitting and Density Clustering. 107-111 - Xiong Chen, Ruliang Xiao, Xin Du, Xinhong Lin, Li Lin:
Constructing A Novel Spark-based Distributed Maximum Frequent Sequence Pattern Mining for IoT Log. 112-116 - Lingjing Kong, Guowei Huang, Ying Zhou, Jianfeng Ye:
Fast Abnormal Identification for Large Scale Internet Traffic. 117-120 - Chuanchuan Wang, Yonghu Zeng, Liandong Wang:
A Modified Source Number Estimation Method based on Wavelet Analysis and Singular Value Decomposition. 121-124
Computer theory and calculation
- Dapeng Man, Wu Yang, Guoqing Tian:
Multi-pattern Matching Algorithm based on Variable Step Size. 125-128 - Dapeng Man, Wu Yang, Zeya Lu:
Research on Task Scheduling Model for Multi-core Processor. 129-133 - Yonggen Gu, Dingding Hou, Xiaohong Wu:
A Cloud Storage Resource Transaction Mechanism Based on Smart Contract. 134-138 - Shengshi Zheng, Xuerong Yue, Zhibin Chen:
Parallel Machine Scheduling with Rejection under Special Conditions. 139-143 - Wei-Guo Zhang, Xi-Lin Ma, Jin-Zhong Zhang:
Research on Kubernetes' Resource Scheduling Scheme. 144-148 - Chuanchuan Wang, Yonghu Zeng, Liandong Wang:
Mixing Matrix Estimation Method for UBSS based on Observed Data Segmentation. 149-154 - Xu Zhang, Shaowu Zhou, Peng Lin, Wei Huang, Wendu Li:
Stability Analysis of Tail Water Slope out of the Underground Power Station in Hydropower Engineering. 155-159
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.