


default search action
8th ICCNS 2018: Qingdao, China
- Proceedings of the 8th International Conference on Communication and Network Security, ICCNS 2018, Qingdao, China, November 02-04, 2018. ACM 2018, ISBN 978-1-4503-6567-3

Cyber attack and defense strategy
- Mohammad Hashem Haghighat, Jun Li:

Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data. 1-6 - Xinli Xiong

, Weiguang Xu, Guangsheng Zhao:
The Effectiveness Assessment for Network Based MTD Strategies. 7-11 - Xiaoming Hu, Wenrong Jiang, Chuang Ma, Chengcheng Yu:

Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme. 12-16 - Guangsheng Zhao, Xinli Xiong, Huaying Wu:

A Model for Analyzing the Effectiveness of Moving Target Defense. 17-21 - Yongchao Wang, Yuyan Chao, Lifeng He:

A Study of Neighbor Users Selection in Email Networks for Spam Filtering. 22-26 - Shijin Li, Minchen Zhu, Yanbin Qiu:

Attack Intent Analysis Method Based on Attack Path Graph. 27-31 - Yanbin Qiu, Yanhua Liu, Shijin Li:

A method of cyber risk control node selection based on Game Theory. 32-36 - Peihuang Su, Yanhua Liu, Xiang Song:

Research on Intrusion Detection Method Based on Improved Smote and XGBoost. 37-41
Network and data security
- Haonan Sun, Rongyu He:

Certification and remote attestation methods of the eTPM trusted cloud. 42-49 - Athmane Seghier:

Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes. 50-55 - Yikun Jiang, Wei Xie

, Yong Tang:
Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers. 56-63 - Jianfeng Zhao:

Case Study: Discovering Hardware Trojans Based on model checking. 64-68 - Xiaojian Liu, Xiaofeng Dong, Qian Lei:

Android Malware Detection Based on Multi-Features. 69-73 - Cangshuai Wu, Jiangyong Shi, Yuexiang Yang, Wenhua Li

:
Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning. 74-78 - Mengli Zhang, Qihui Zhang, Xuexian Hu, Wenfen Liu:

A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network. 79-83 - Yuxuan Zhang, Jianghong Wei, Xiaojian Zhang

, Xuexian Hu, Wenfen Liu:
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy. 84-89
Communication network and signal processing
- Shiyu Shen, Jianlin Gao, Aitian Wu:

Weakness Identification and Flow Analysis Based on Tor Network. 90-94 - Yunfang Chen, Que Wu, Wei Zhang, Qiangchun Liu:

SD-WAN Source Route Based on Protocol-oblivious Forwarding. 95-99 - Gangcan Sun, Mengge Liu, Zhuo Han:

Multiple Eavesdropper-Based Physical Layer Security in TAS/MRC System With Antenna Correlation. 100-106 - Xiaodong Bai, Wendeng Zhu, Gengxin Zhang, Tao Hong, Laiding Zhao, Jing Hu:

Identification Method of Power Spectral Signal Based on Fourier Series Fitting and Density Clustering. 107-111 - Xiong Chen, Ruliang Xiao, Xin Du, Xinhong Lin, Li Lin:

Constructing A Novel Spark-based Distributed Maximum Frequent Sequence Pattern Mining for IoT Log. 112-116 - Lingjing Kong, Guowei Huang, Ying Zhou, Jianfeng Ye:

Fast Abnormal Identification for Large Scale Internet Traffic. 117-120 - Chuanchuan Wang, Yonghu Zeng, Liandong Wang:

A Modified Source Number Estimation Method based on Wavelet Analysis and Singular Value Decomposition. 121-124
Computer theory and calculation
- Dapeng Man, Wu Yang, Guoqing Tian:

Multi-pattern Matching Algorithm based on Variable Step Size. 125-128 - Dapeng Man, Wu Yang, Zeya Lu:

Research on Task Scheduling Model for Multi-core Processor. 129-133 - Yonggen Gu, Dingding Hou, Xiaohong Wu:

A Cloud Storage Resource Transaction Mechanism Based on Smart Contract. 134-138 - Shengshi Zheng, Xuerong Yue, Zhibin Chen:

Parallel Machine Scheduling with Rejection under Special Conditions. 139-143 - Wei-Guo Zhang, Xi-Lin Ma, Jin-Zhong Zhang:

Research on Kubernetes' Resource Scheduling Scheme. 144-148 - Chuanchuan Wang, Yonghu Zeng, Liandong Wang:

Mixing Matrix Estimation Method for UBSS based on Observed Data Segmentation. 149-154 - Xu Zhang, Shaowu Zhou, Peng Lin, Wei Huang, Wendu Li:

Stability Analysis of Tail Water Slope out of the Underground Power Station in Hydropower Engineering. 155-159

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














