default search action
Search dblp for Publications
export results for "stream:streams/conf/iccns:"
@inproceedings{DBLP:conf/iccns/0003F23, author = {Jan Pospisil and Radek Fujdiak}, title = {Increasing data rate of LoRa technology using frequency division multiplex}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {330--334}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638833}, doi = {10.1145/3638782.3638833}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/0003F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/0004ZWZJH23, author = {Rui Ma and Xvhong Zhou and Xiajing Wang and Zheng Zhang and Jinman Jiang and Wei Huo}, title = {pAFL: Adaptive Energy Allocation with Upper Confidence Bound}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {62--68}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638792}, doi = {10.1145/3638782.3638792}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/0004ZWZJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/AiYLLTR23, author = {Xin Ai and Qingqing Yue and Hongchen Li and Wenlong Li and Shanshan Tu and Sadaqat ur Rehman}, title = {Physical Layer Authentication Based on Transformer}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {203--208}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638813}, doi = {10.1145/3638782.3638813}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/AiYLLTR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BaoLCYCZ23, author = {Ruishen Bao and Jiayin Li and Yuzhong Chen and Kaihui Yang and Ziyang Chen and Yuanyuan Zhang}, title = {PracticalHAR: {A} Practical Method of Human Activity Recognition Based on Embedded Sensors of Mobile Phone}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {342--349}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638835}, doi = {10.1145/3638782.3638835}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BaoLCYCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BohacikHFR23, author = {Antonin Bohacik and Eva Holasova and Radek Fujdiak and Jan Racka}, title = {Convolutional Neural Network-Based Classification of Secured {IEC} 104 Traffic in Energy Systems}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {159--165}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638806}, doi = {10.1145/3638782.3638806}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BohacikHFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Chen23, author = {Yanming Chen}, title = {Optoelectronic Task Processing based on Multilevel Collaborative Computing Networks: An Optimization-based Approach}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {178--182}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638809}, doi = {10.1145/3638782.3638809}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenX0ZSLMLZ23, author = {Zhiyi Chen and Peizhe Xin and Peng Zhan and Menhua Zheng and Yuxiao Sun and Can Li and Ping Meng and Yajie Li and Yongli Zhao}, title = {Learned Digital Back-Propagation for an optical-domain waveform integrated with communication and sensing}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {312--316}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638830}, doi = {10.1145/3638782.3638830}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenX0ZSLMLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenYD23, author = {Daowei Chen and Hongsheng Yan and Wei Dai}, title = {Selection of defense strategy for high-level network based on multistage {APT} attack-defense game}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {166--172}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638807}, doi = {10.1145/3638782.3638807}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenYD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenZLM23, author = {Da Chen and Feng Biao Zan and Xin Liu and Xuan Meng}, title = {{DROO-C} Data Transfer in a Mobile Edge Computing Offloading Framework}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {282--293}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638826}, doi = {10.1145/3638782.3638826}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenZLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/DuanYCLX23, author = {Shihui Duan and Renhe Yan and Jie Chen and Meihui Liu and Qichen Xu}, title = {Comparison and Testing of Time Synchronization Accuracy between {IEEE} 1588v2 and {IEEE} 802.1AS}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {300--305}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638828}, doi = {10.1145/3638782.3638828}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/DuanYCLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Gao0SWH23, author = {Jiazi Gao and Xin Sun and Zhengyu Song and Jun Wang and Tianwei Hou}, title = {A Novel Single-Station Tracking Algorithm towards High-Dynamic Targets in 3D Space}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {335--341}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638834}, doi = {10.1145/3638782.3638834}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Gao0SWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuFLZL23, author = {Wenzhe Gu and Botao Feng and Yiyuan Luo and Jianchao Zheng and Yun Lu}, title = {A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Applications}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {246--251}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638820}, doi = {10.1145/3638782.3638820}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuFLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuoLCWBD23, author = {Xiaodong Guo and Chenxi Lyu and Zhenyi Chen and Xiaoding Wang and Ruishen Bao and Chen Dong}, title = {Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {106--111}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638799}, doi = {10.1145/3638782.3638799}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuoLCWBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HolasovaFBB23, author = {Eva Holasova and Radek Fujdiak and Petr Blazek and Antonin Bohacik}, title = {Automated Neural Network Structure Design for Efficient}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {215--221}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638815}, doi = {10.1145/3638782.3638815}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HolasovaFBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HuangSZWL23, author = {Jianhui Huang and Changxiang Shen and Jianbiao Zhang and Liang Wang and Ruqian Li}, title = {A Trusted Execution Environment Architecture for Big Data Computing Platform Based on {TPCM}}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {88--93}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638796}, doi = {10.1145/3638782.3638796}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HuangSZWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/JiaoLL23, author = {Jian Jiao and Zhifei Liu and Lan Li}, title = {Intranet security detection based on image and deep transfer learning}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {196--202}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638812}, doi = {10.1145/3638782.3638812}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/JiaoLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KucharBF23, author = {Karel Kuchar and Petr Blazek and Radek Fujdiak}, title = {From Playground to Battleground: Cyber Range Training for Industrial Cybersecurity Education}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {209--214}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638814}, doi = {10.1145/3638782.3638814}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KucharBF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LaiYCLCS23, author = {Changping Lai and Yinan Yao and Yuzhong Chen and Xintian Liang and Tianqi Cai and Yiqing Shi}, title = {Detection of IoT Botnet Based on Convolutional Neural Network and Linear Support Vector Machine}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {222--226}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638816}, doi = {10.1145/3638782.3638816}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LaiYCLCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiQ23, author = {Taoshen Li and Zhijun Qi}, title = {{D2D} communication resource allocation algorithm based on multi-agent reinforcement learning}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {276--281}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638825}, doi = {10.1145/3638782.3638825}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiQ23a, author = {Aiguo Li and Zhuoping Qiang}, title = {Multi-sensor data fusion method based on adaptive Kalman filtering}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {306--311}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638829}, doi = {10.1145/3638782.3638829}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiQ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiS23, author = {Zhihao Li and Zhongwei Sun}, title = {A Cross-Domain Authentication Scheme for Electric Vehicle Intelligent Charging for Multiple Power Service Providers}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {26--31}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638787}, doi = {10.1145/3638782.3638787}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiYXWZ23, author = {Yufeng Li and Xu Yan and Mingxuan Xiao and Weimin Wang and Fei Zhang}, title = {Investigation of Creating Accessibility Linked Data Based on Publicly Available Accessibility Datasets}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {77--81}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638794}, doi = {10.1145/3638782.3638794}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiYXWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LinYZL023, author = {Zhirun Lin and Yang Yang and Yonghua Zhan and Jiayin Li and Chen Dong}, title = {Blockchain-based Searchable Encryption Scheme for Spatial Text Data}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {100--105}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638798}, doi = {10.1145/3638782.3638798}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LinYZL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LinZL23, author = {Han Lin and Jian Zou and Jiayin Li}, title = {The differential meet-in-the-middle attack on {FUTURE} and {CRAFT}}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {151--158}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638805}, doi = {10.1145/3638782.3638805}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LinZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuGYCYL23, author = {Zeyi Liu and Xiaodong Guo and Yinan Yao and Yuzhong Chen and Xin Yang and Jiayin Li}, title = {Nonstationary Network Traffic Prediction With RevIN-based {LSTM}}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {265--269}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638823}, doi = {10.1145/3638782.3638823}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuGYCYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuH23, author = {Lei Liu and Ziyou He}, title = {Webshell Detection Based On CodeBERT And Deep Learning}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {32--39}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638788}, doi = {10.1145/3638782.3638788}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuP23, author = {Youwu Liu and Rajamohan Parthasarathy}, title = {Optimizing Wireless Mesh Network Gateway Deployment Using an Enhanced Sparrow Optimization Algorithm}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {270--275}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638824}, doi = {10.1145/3638782.3638824}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LyuYGHDZC23, author = {Chenxi Lyu and Yinan Yao and Xiaodong Guo and Zihong Huang and Chen Dong and Yuanyuan Zhang and Zhenyi Chen}, title = {AntiMal: an Approach of Malware Detection Employing Swin Transformer}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {1--5}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638783}, doi = {10.1145/3638782.3638783}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LyuYGHDZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/NiZZLG23, author = {Liang Ni and Hengsheng Zhou and Yawei Zhang and Xiaoyan Liu and Bingke Gu}, title = {Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {117--126}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638801}, doi = {10.1145/3638782.3638801}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/NiZZLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/PospisilF23, author = {Ondrej Pospisil and Radek Fujdiak}, title = {Identifying Industry Devices via Time Delay in Dataflow}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {173--177}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638808}, doi = {10.1145/3638782.3638808}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/PospisilF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SangiNSTMEA23, author = {Abdur Rashid Sangi and Jyothish Nagaram and Akshara Sudulagunta and Sai Sandeep Talari and Vinay Malla and Murali Krishna Enduri and Satish Anamalamudi}, title = {Tackling Disinformation: Machine Learning Solutions for Fake News Detection}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {46--51}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638790}, doi = {10.1145/3638782.3638790}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SangiNSTMEA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/TuLALYR23, author = {Shanshan Tu and Wenlong Li and Xin Ai and Hongchen Li and Qingqing Yue and Sadaqat ur Rehman}, title = {A Hybrid Deep Learning Model for Breast Cancer Detection and Classification}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {350--353}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638836}, doi = {10.1145/3638782.3638836}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/TuLALYR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangCG23, author = {Bingquan Wang and Meili Cui and Junchen Gao}, title = {Security authentication protocol for Industrial Internet of Things}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {234--240}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638818}, doi = {10.1145/3638782.3638818}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangMZYX23, author = {Chengling Wang and Yunru Ma and Yuexin Zhang and Ayong Ye and Li Xu}, title = {A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {12--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638785}, doi = {10.1145/3638782.3638785}, timestamp = {Thu, 27 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangMZYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangTYY23, author = {Mao Wang and Shanshan Tu and Haoyu Yu and Peihe Yan}, title = {Anonymous Authentication Scheme with Zero-Knowledge Proof Based on Private Blockchain}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {52--61}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638791}, doi = {10.1145/3638782.3638791}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangTYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangYFFC23, author = {Xiaozhou Wang and Jianfei Ye and Linjie Feng and Chenji Feng and Jun Chen}, title = {Trusted Delivery Mechanisms for Software Supply Chains Based on Trusted Execution Environment}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {19--25}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638786}, doi = {10.1145/3638782.3638786}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangYFFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangYLWLL23, author = {Xiaozhou Wang and Jianfei Ye and Tong Liu and Yinjie Wang and Xuefang Li and Lin Lin}, title = {Dynamic Trust Assessment Method for Mobile Network Devices}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {241--245}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638819}, doi = {10.1145/3638782.3638819}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangYLWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuKLZW23, author = {Qiaowen Wu and Yaojie Ke and Zhanghui Liu and Yuanyuan Zhang and Qiyan Wu}, title = {Marine litter detection based on YOLOv7 algorithm and data encryption protection}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {82--87}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638795}, doi = {10.1145/3638782.3638795}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WuKLZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuLLWJ23, author = {Ning Wu and Li Li and Xingyu Liu and Ziwen Wang and Tongyao Jia}, title = {Enhancing {UAV} Swarm Routing with Multi-Agent Attention Reinforcement Learning}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {258--264}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638822}, doi = {10.1145/3638782.3638822}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WuLLWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XiWZ23, author = {Wentao Xi and Xingjun Wu and Kai Zhang}, title = {A low-cost configurable hash computing circuit for {PQC} algorithm}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {112--116}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638800}, doi = {10.1145/3638782.3638800}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XiWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XiaoWFSX23, author = {Nianhao Xiao and Long Wang and Jing Fan and Chunzhu Shi and Yutong Xie}, title = {A Certificateless Trusted Connection Protocol for Smart Factories}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {144--150}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638804}, doi = {10.1145/3638782.3638804}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XiaoWFSX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XingCZ23, author = {Dandan Xing and Suzhen Cao and Yifan Zhang}, title = {Environment monitoring solution for Flying Ad-hoc Networks based on certificateless aggregate signature}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {183--188}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638810}, doi = {10.1145/3638782.3638810}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XingCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XuLZYLKPA23, author = {Zhichao Xu and Faping Lu and Zhilin Zhang and Dongkai Yang and Xiguo Liu and Jiafang Kang and Yaozong Pan and Qi An}, title = {A Flexible Waveform Based on PSWFs Signal for Next-Generation Communication}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {317--322}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638831}, doi = {10.1145/3638782.3638831}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XuLZYLKPA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XuZLL23, author = {Jinxing Xu and Jian Zou and Qiufu Lan and Jiayin Li}, title = {Improved Meet-in-the-Middle Cryptanalysis on Kupyna}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {136--143}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638803}, doi = {10.1145/3638782.3638803}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XuZLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YanTW23, author = {Peihe Yan and Shanshan Tu and Mao Wang}, title = {Multi-User Identity Authentication in Wireless Communication Based on Deep Learning and Data Augmentation}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {189--195}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638811}, doi = {10.1145/3638782.3638811}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YanTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangYGHLCL23, author = {Zhongliao Yang and Yinan Yao and Xiaodong Guo and Peixin Huang and Jiayin Li and Yuzhong Chen and Xintian Liang}, title = {A Module Placement Method for Digital Microfluidic Biochips Based on Security Design}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {40--45}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638789}, doi = {10.1145/3638782.3638789}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangYGHLCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YaoDXLG0W23, author = {Yinan Yao and Chen Dong and Zhengye Xie and Yuqing Li and Xiaodong Guo and Yang Yang and Xiaoding Wang}, title = {A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {69--76}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638793}, doi = {10.1145/3638782.3638793}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YaoDXLG0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZM023, author = {Yanggege Zhang and Bo Zhang and Te Ma and Jie Hu}, title = {Multi-UAVs Cooperative Target Search with Communication Constraint}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {252--257}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638821}, doi = {10.1145/3638782.3638821}, timestamp = {Thu, 23 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZS23, author = {Qian Zhang and Xing Zhang and Wei Shi}, title = {Privacy-preserving Trajectory Data Release Hierarchical Model}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {94--99}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638797}, doi = {10.1145/3638782.3638797}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhaoLLT23, author = {Wei Zhao and Zhiwei Li and Ruilin Li and Chaojing Tang}, title = {CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {6--11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638784}, doi = {10.1145/3638782.3638784}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhaoLLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhaoWHLW23, author = {Hangyu Zhao and Daobin Wang and Quansheng Huang and Guangfu Li and Kun Wen}, title = {A Phase Noise Suppression Method Based on Real-imaginary Alternating Pilots for Coherent Optical {OFDM-OQAM} Communication Systems}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {323--329}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638832}, doi = {10.1145/3638782.3638832}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhaoWHLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhongCSLC23, author = {Jiayuan Zhong and Yuzhong Chen and Yiqing Shi and Yan Li and Peiqing Chen}, title = {A Novel Network Traffic Prediction Method Based on Complete Ensemble Empirical Mode Decomposition with Adaptive Noise}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {294--299}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638827}, doi = {10.1145/3638782.3638827}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhongCSLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhuZZQ23, author = {Chaoyang Zhu and Xiao Zhu and Zhenrong Zhang and Tuanfa Qin}, title = {A Privacy Protecting Mechanism in {UAV-MEC} Network with Blockchain-Enabled Federated Learning}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {227--233}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638817}, doi = {10.1145/3638782.3638817}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhuZZQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZouTNXXL23, author = {Wei Zou and Shanshan Tu and Zhenhu Ning and Jiawei Xu and Shuaikun Xing and Xue Liao}, title = {An improved particle swarm optimization algorithm for {P300} Neural network recognizer}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {127--135}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638802}, doi = {10.1145/3638782.3638802}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZouTNXXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2023, title = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782}, doi = {10.1145/3638782}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/AzhariB22, author = {Luthfi Azhari and Ari Moesriami Barmawi}, title = {Activity Attribute-Based User Behavior Model for Continuous User Authentication}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {69--76}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586113}, doi = {10.1145/3586102.3586113}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/AzhariB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BaiTY0WZ22, author = {Xuetao Bai and Shanshan Tu and Haishuang Yan and Yongjie Yang and Aiming Wu and Yihe Zhang}, title = {SPoW: {A} solution to the problem of centralization of computing power}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {205--210}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586133}, doi = {10.1145/3586102.3586133}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BaiTY0WZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BarkworthTL22, author = {Ashley Barkworth and Rehnuma Tabassum and Arash Habibi Lashkari}, title = {Detecting {IMAP} Credential Stuffing Bots Using Behavioural Biometrics}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {7--15}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586104}, doi = {10.1145/3586102.3586104}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BarkworthTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenLW22, author = {Yunwen Chen and Zheng Li and Weiru Wang}, title = {A mutual authentication and key establishment scheme for peer to peer network scenario}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {140--145}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586123}, doi = {10.1145/3586102.3586123}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChopraVL22, author = {Abhishek Chopra and Nikhill Vombatkere and Arash Habibi Lashkari}, title = {AuthAttLyzer: {A} Robust defensive distillation-based Authorship Attribution framework}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {43--50}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586109}, doi = {10.1145/3586102.3586109}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChopraVL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GaoJL22, author = {Tiaokang Gao and Xiaoning Jin and Yingxu Lai}, title = {Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {30--35}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586107}, doi = {10.1145/3586102.3586107}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GaoJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Ge0LZZ22, author = {Ruihai Ge and Yongzheng Zhang and Shuhao Li and Guoqiao Zhou and Guangze Zhao}, title = {Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {23--29}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586106}, doi = {10.1145/3586102.3586106}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Ge0LZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuiYYGWC22, author = {Yanshuang Gui and Miaomiao Yang and Haishuang Yan and Yayun Guo and Qixu Wang and Xingshu Chen}, title = {{MURAS:} An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {98--104}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586117}, doi = {10.1145/3586102.3586117}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuiYYGWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HongN22, author = {Yu Hong and Zhenhu Ning}, title = {A trusted construction mechanism for sever based on trusted hard disk}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {90--97}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586116}, doi = {10.1145/3586102.3586116}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HongN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KhanTAAAW22, author = {Mansoor Khan and Shanshan Tu and Ghulam Abbas and Ziaul Haq Abbas and Hisham Alasmary and Muhammad Waqas}, title = {A Reliable and Stable {V2V} Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {159--167}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586126}, doi = {10.1145/3586102.3586126}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KhanTAAAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiY22, author = {Aiguo Li and Wenhao Yan}, title = {Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {85--89}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586137}, doi = {10.1145/3586102.3586137}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiY22a, author = {Aiguo Li and Jie Yang}, title = {Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless network}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {110--116}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586138}, doi = {10.1145/3586102.3586138}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiaoZXXZZWN22, author = {Xue Liao and Yihua Zhou and Jiawei Xu and Shuaikun Xing and Wei Zou and Jin Zhou and Qi Wang and Zhenhu Ning}, title = {Identity-based Linkable Blind Ring Signature Scheme on Lattice}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {51--57}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586110}, doi = {10.1145/3586102.3586110}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiaoZXXZZWN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LuoJHS22, author = {Shaojie Luo and Minhao Jin and Rongjie Han and Kexin Sun}, title = {Anti-jamming based on Reinforcement Learning in Power System Sensing Network}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {180--184}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586129}, doi = {10.1145/3586102.3586129}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LuoJHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/QinLRT22, author = {Su{-}Juan Qin and Zhao Liu and Feixiang Ren and Chong Tan}, title = {Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {219--226}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586135}, doi = {10.1145/3586102.3586135}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/QinLRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/TanCZZLL22, author = {Chong Tan and Han Chen and Songlei Zhang and Di Zhai and Yang Lu and Hong Liu}, title = {Traffic offloading based on content sharing in {D2D} for Smart Grid}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {185--190}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586130}, doi = {10.1145/3586102.3586130}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/TanCZZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Venkatasubramanian22, author = {Madumitha Venkatasubramanian and Arash Habibi Lashkari and Saqib Hakak}, title = {Federated Learning Assisted IoT Malware Detection Using Static Analysis}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {191--198}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586131}, doi = {10.1145/3586102.3586131}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Venkatasubramanian22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WaliIH22, author = {Heera G. Wali and Nalini C. Iyer and Shraddha B. Hiremath}, title = {Hardware Implementation of {SPONGENT} Lightweight Hash Algorithm}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {105--109}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586118}, doi = {10.1145/3586102.3586118}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WaliIH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WanHLZL22, author = {Ming Wan and Minglei Hao and Yang Li and Jianming Zhao and Ying Li}, title = {Insights on Cooperative Defense for Multiple Industrial Security Technologies}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {168--173}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586127}, doi = {10.1145/3586102.3586127}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WanHLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZMDJ22, author = {Xiaoliang Wang and Feng Zhang and Yanbo Ma and Wenjuan Dai and Yingying Jin}, title = {Trust evaluation model based on improved Bayesian theory for the Internet of Things}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {152--158}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586125}, doi = {10.1145/3586102.3586125}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZMDJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuTLZ0B22, author = {Aiming Wu and Shanshan Tu and Junwei Liu and Yihe Zhang and Yongjie Yang and Xuetao Bai}, title = {Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {16--22}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586105}, doi = {10.1145/3586102.3586105}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WuTLZ0B22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuWX22, author = {Xiaoyan Wu and Xiaofeng Wang and Qianqian Xing}, title = {Identity-Based Authentication Protocol for Trustworthy {IP} Address}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {58--63}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586111}, doi = {10.1145/3586102.3586111}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WuWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangCT022, author = {Shisong Yang and Yuwen Chen and Shanshan Tu and Zhen Yang}, title = {A Post-quantum Secure Aggregation for Federated Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {117--124}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586120}, doi = {10.1145/3586102.3586120}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangCT022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangS22, author = {Siyuan Yang and Yuhao Sun}, title = {Status and Key Technologies of UAV-boat Cross-domain Collaborative Development}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {131--139}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586122}, doi = {10.1145/3586102.3586122}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangTYZWB22, author = {Yongjie Yang and Shanshan Tu and Haishuang Yan and Yihe Zhang and Aiming Wu and Xuetao Bai}, title = {Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {36--42}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586108}, doi = {10.1145/3586102.3586108}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangTYZWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangWH22, author = {Yang Yang and Zengtao Wei and Minming Huang}, title = {Accountable Policy-Based Sanitizable Signature for Medical Data Sharing}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {77--84}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586114}, doi = {10.1145/3586102.3586114}, timestamp = {Fri, 11 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YuTZ22, author = {Haoyu Yu and Shanshan Tu and Yihe Zhang}, title = {Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {199--204}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586132}, doi = {10.1145/3586102.3586132}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YuTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YuanZWTG22, author = {Yidong Yuan and Tianmeng Zhang and Chaoyi Wang and Lu Tian and Jinchun Gao}, title = {Impact of Common Mode Current Induced by Transformer on Electromagnetic Radiation in Digital Isolation Chip}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {125--130}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586121}, doi = {10.1145/3586102.3586121}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YuanZWTG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangT00WB22, author = {Yihe Zhang and Shanshan Tu and Muhammad Waqas and Yongjie Yang and Aiming Wu and Xuetao Bai}, title = {Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {211--218}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586134}, doi = {10.1145/3586102.3586134}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangT00WB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangTZ0WB22, author = {Yihe Zhang and Shanshan Tu and Shengju Zhang and Yongjie Yang and Aiming Wu and Xuetao Bai}, title = {Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {227--233}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586136}, doi = {10.1145/3586102.3586136}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangTZ0WB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangY022, author = {Yueqi Zhang and Ruiping Yin and Zhen Yang}, title = {Data Poisoning Attacks to Session-Based Recommender Systems}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {1--6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586103}, doi = {10.1145/3586102.3586103}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengKYT22, author = {Wei Zheng and Naixin Kang and Tao Ye and Haining Tan}, title = {Trusted authentication mechanism oriented to network computing offloading at the perception layer}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {146--151}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586124}, doi = {10.1145/3586102.3586124}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhengKYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengKYW22, author = {Wei Zheng and Naixin Kang and Tao Ye and Qi Wang}, title = {Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {174--179}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586128}, doi = {10.1145/3586102.3586128}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhengKYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhouNWW22, author = {Jin Zhou and Zhenhu Ning and Qi Wang and Yuchen Wang}, title = {Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios}, booktitle = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, pages = {64--68}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102.3586112}, doi = {10.1145/3586102.3586112}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhouNWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2022, title = {Proceedings of the 12th International Conference on Communication and Network Security, {ICCNS} 2022, Beijing, China, December 1-3, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3586102}, doi = {10.1145/3586102}, isbn = {978-1-4503-9752-0}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BarmawiN21, author = {Ari Moesriami Barmawi and Asep Rizal Nurjaman}, title = {Strengthening the Security of Deniable Authentication Scheme Using Zero-Knowledge Proof}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {27--34}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507513}, doi = {10.1145/3507509.3507513}, timestamp = {Thu, 31 Aug 2023 14:03:39 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BarmawiN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/DingHLHZQ21, author = {Zhonglin Ding and Yang Hu and Wei Luo and Zhongming Huang and Lei Zhang and Zhongyuan Qin}, title = {Security Analysis of Embedded {SIM} Remote Provisioning Protocol Using {SPIN}}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {43--48}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507515}, doi = {10.1145/3507509.3507515}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/DingHLHZQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuHZAHFZ21, author = {Yilong Gu and Yangchao Huang and Yuetong Zhang and Qi An and Huizhu Han and Youbin Fu and Yanhui Zhang}, title = {Optimization of Spectrum Efficiency in {UAV} Cognitive Communication Network Based on Trajectory Planning}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {35--42}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507514}, doi = {10.1145/3507509.3507514}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuHZAHFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KarakateEO21, author = {Meatasit Karakate and Hiroshi Esaki and Hideya Ochiai}, title = {SDNHive: {A} Proof-of-Concept {SDN} and Honeypot System for Defending Against Internal Threats}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {9--20}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507511}, doi = {10.1145/3507509.3507511}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KarakateEO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MaYCH21, author = {Tao Ma and Fang Yang and Chao Chang and Jun Huang}, title = {Mission-Oriented Networks Robustness Based on Cascade Model}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {87--92}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507521}, doi = {10.1145/3507509.3507521}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MaYCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MahdavifarSVRGH21, author = {Samaneh Mahdavifar and Amgad Hanafy Salem and Princy Victor and Amir H. Razavi and Miguel Garz{\'{o}}n and Natasha Hellberg and Arash Habibi Lashkari}, title = {Lightweight Hybrid Detection of Data Exfiltration using {DNS} based on Machine Learning}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {80--86}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507520}, doi = {10.1145/3507509.3507520}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MahdavifarSVRGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MeiryaniFWLDU21, author = {Meiryani Meiryani and Hanny Franciska and Rindang Widuri and Suryadiputra Liawatimena and Zaidi Mat Daud and Hana Ulinnuha}, title = {Analysis of Software Accounting Effectiveness on Data Sales in Bliss Kitchen}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {100--106}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507523}, doi = {10.1145/3507509.3507523}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MeiryaniFWLDU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MeiryaniPWDL21, author = {Meiryani Meiryani and Noviyanti Hanna Uli Pakpahan and Dianka Wahyuningtias and Zaidi Mat Daud and Suryadiputra Liawatimena}, title = {The Role of Financial Technology for Development of Micro, Small and Medium Enterprises (Msmes) in Indonesia}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {60--65}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507518}, doi = {10.1145/3507509.3507518}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MeiryaniPWDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/RuZF021, author = {Kaiqi Ru and Yaning Zheng and Xuewei Feng and Dongxia Wang}, title = {The Side-Channel Vulnerability in Network Protocol}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {1--8}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507510}, doi = {10.1145/3507509.3507510}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/RuZF021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShiW21, author = {Tuo Shi and Yutong Wu}, title = {Research on the Deep Integration of 5G Technology and Social Security Management of Police Department}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {93--99}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507522}, doi = {10.1145/3507509.3507522}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ShiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SunZFGZ21, author = {Lanjun Sun and Shaojun Zhang and Zhenshan Fu and Yuehong Gong and Yanchao Zhang}, title = {Bidirectional Underwater Blue-green Laser Communication Based on {OFDM} Modulation}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {49--54}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507516}, doi = {10.1145/3507509.3507516}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SunZFGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangLC21, author = {Zhaoji Zhang and Qianhui Liu and Xiaorui Chai}, title = {Shallow Underground Space Exploration and IoT Security Monitoring}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {55--59}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507517}, doi = {10.1145/3507509.3507517}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangLD21, author = {Wenzhen Zhang and Tianbo Lu and Zeyu Du}, title = {{TNRAS:} Tor Nodes Reliability Analysis Scheme}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {21--26}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507512}, doi = {10.1145/3507509.3507512}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhangLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangYL21, author = {Yue Zhang and Guozheng Yang and Zhihao Luo}, title = {Research on Topology Evolution of Autonomous System Network}, booktitle = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, pages = {66--79}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509.3507519}, doi = {10.1145/3507509.3507519}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2021, title = {{ICCNS} 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3 - 5, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3507509}, doi = {10.1145/3507509}, isbn = {978-1-4503-8642-5}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Adamsky0S020, author = {Florian Adamsky and Daniel Kaiser and Michael Steglich and Thomas Engel}, title = {Locust: Highly Concurrent {DHT} Experimentation Framework for Security Evaluations}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {115--122}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442531}, doi = {10.1145/3442520.3442531}, timestamp = {Thu, 12 Aug 2021 15:30:47 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Adamsky0S020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/AlasmariW020, author = {Sultan Alasmari and Weichao Wang and Yu Wang}, title = {Proof of Network Security Services: Enforcement of Security {SLA} through Outsourced Network Testing}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {52--59}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442533}, doi = {10.1145/3442520.3442533}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/AlasmariW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BarutZLZ20, author = {Onur Barut and Rebecca Zhu and Yan Luo and Tong Zhang}, title = {{TLS} Encrypted Application Classification Using Machine Learning with Flow Feature Engineering}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {32--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442529}, doi = {10.1145/3442520.3442529}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BarutZLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChancusiDN20, author = {Agust{\'{\i}}n Chancusi and Pa{\'{u}}l Diestra and Dami{\'{a}}n Nicolalde}, title = {Vulnerability Analysis of the Exposed Public IPs in a Higher Education Institution}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {83--90}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442523}, doi = {10.1145/3442520.3442523}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChancusiDN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/CuiU20, author = {Pinchen Cui and David A. Umphress}, title = {Towards Unsupervised Introspection of Containerized Application}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {42--51}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442530}, doi = {10.1145/3442520.3442530}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/CuiU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LashkariKR20, author = {Arash Habibi Lashkari and Gurdip Kaur and Abir Rahali}, title = {DIDarknet: {A} Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {1--13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442521}, doi = {10.1145/3442520.3442521}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LashkariKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LvCM20, author = {Na Lv and Tianyu Chen and Yuan Ma}, title = {Analysis on Entropy Sources based on Smartphone Sensors}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {21--31}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442528}, doi = {10.1145/3442520.3442528}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LvCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MartiriY20, author = {Edlira Martiri and Bian Yang}, title = {On the predictability of biometric honey templates, based on Bayesian inference}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {123--134}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442532}, doi = {10.1145/3442520.3442532}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/MartiriY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/RahaliLKTGM20, author = {Abir Rahali and Arash Habibi Lashkari and Gurdip Kaur and Laya Taheri and Fran{\c{c}}ois Gagnon and Fr{\'{e}}d{\'{e}}ric Massicotte}, title = {DIDroid: Android Malware Classification and Characterization Using Deep Image Learning}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {70--82}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442522}, doi = {10.1145/3442520.3442522}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/RahaliLKTGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShuklaMV20, author = {Sanjeev Shukla and Manoj Misra and Gaurav Varshney}, title = {Identification of Spoofed Emails by applying Email Forensics and Memory Forensics}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {109--114}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442527}, doi = {10.1145/3442520.3442527}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ShuklaMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Wang0TW20, author = {Xuefei Wang and Rui Ma and Donghai Tian and Xiajing Wang}, title = {{VCPEC:} Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {99--108}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442526}, doi = {10.1145/3442520.3442526}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Wang0TW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZZMW20, author = {Yongfu Wang and Ying Zhou and Xiaohai Zou and Quanqiang Miao and Wei Wang}, title = {The analysis method of security vulnerability based on the knowledge graph}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {135--145}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442535}, doi = {10.1145/3442520.3442535}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZZMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WongTMD20, author = {Kok{-}Seng Wong and Nguyen Anh Tu and Anuar Maratkhan and M. Fatih Demirci}, title = {A Privacy-Preserving Framework for Surveillance Systems}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {91--98}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442524}, doi = {10.1145/3442520.3442524}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/WongTMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YamashitaMSN20, author = {Tomoya Yamashita and Daisuke Miyamoto and Yuji Sekiya and Hiroshi Nakamura}, title = {Slow Scan Attack Detection Based on Communication Behavior}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {14--20}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442525}, doi = {10.1145/3442520.3442525}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/YamashitaMSN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangHWZL20, author = {Ming Yang and Xuexian Hu and Jianghong Wei and Qihui Zhang and Wenfen Liu}, title = {Outsourced Secure {ID3} Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {60--69}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442534}, doi = {10.1145/3442520.3442534}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangHWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2020, title = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520}, doi = {10.1145/3442520}, isbn = {978-1-4503-8903-7}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BaiQC19, author = {Enjian Bai and Fangyuan Qin and Sijing Chen}, title = {Effective Scrambling Scheme for Physical Layer Security}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {92--96}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371689}, doi = {10.1145/3371676.3371689}, timestamp = {Thu, 22 Apr 2021 19:04:09 +0200}, biburl = {https://dblp.org/rec/conf/iccns/BaiQC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChangS19, author = {Qingqing Chang and Shenghui Su}, title = {Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {34--39}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371682}, doi = {10.1145/3371676.3371682}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenH19, author = {Yanyan Chen and Wenxian Han}, title = {Research on Automatically Switched Optical Network Security Based on Quantum Key Distribution}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {75--78}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371701}, doi = {10.1145/3371676.3371701}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenLLG19, author = {Biqiong Chen and Yanhua Liu and Shijin Li and Xiaoling Gao}, title = {Attack Intent Analysis Method Based on Attack Path Graph}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {97--102}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371680}, doi = {10.1145/3371676.3371680}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenLLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/DaiGLYLC19, author = {Rui Dai and Chuan Gao and Bo Lang and Lixia Yang and Hongyu Liu and Shaojie Chen}, title = {{SSL} Malicious Traffic Detection Based On Multi-view Features}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {40--46}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371697}, doi = {10.1145/3371676.3371697}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/DaiGLYLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/DuyAP19, author = {Phan The Duy and Le Duy An and Van{-}Hau Pham}, title = {Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in {SDN}}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {154--158}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371706}, doi = {10.1145/3371676.3371706}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/DuyAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GaoLQL19, author = {Xiaoling Gao and Yanhua Liu and Yanbin Qiu and Huajun Liu}, title = {A Comprehensive Assessment Method of Asset Importance for Key Asset Protection}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {79--83}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371679}, doi = {10.1145/3371676.3371679}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GaoLQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HeDSL19, author = {Qipeng He and Cong Dai and Rong Si and Jianwen Lin}, title = {Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {149--153}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371698}, doi = {10.1145/3371676.3371698}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HeDSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/JiangFZH19, author = {Hua Jiang and Jinpo Fan and Gang Zhang and Ronglei Hu}, title = {Design and Implementation of Integrated Access {VPN} Gateway}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {128--132}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371681}, doi = {10.1145/3371676.3371681}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/JiangFZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KongLZY19, author = {Bin Kong and Zhangpu Liu and Guangming Zhou and Xiaoyan Yu}, title = {A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {47--50}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371705}, doi = {10.1145/3371676.3371705}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KongLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KongYLJHZ19, author = {Fanyu Kong and Guoqiang Yang and Huiyi Liu and Yali Jiang and Chengyu Hu and Dashui Zhou}, title = {Fault-injection Attack and Improvement of a {CRT-RSA} Exponentiation Algorithm}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {123--127}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371699}, doi = {10.1145/3371676.3371699}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KongYLJHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Kun19, author = {Yu Kun}, title = {Deep Security Analysis of {DCS} for Ship's Nuclear Power System based on Improved {DEMATEL}}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {103--108}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371677}, doi = {10.1145/3371676.3371677}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Kun19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiGCL19, author = {Han Li and Chonglin Gu and Yi Chen and Wenye Li}, title = {An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with Blockchain}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {51--57}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371684}, doi = {10.1145/3371676.3371684}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/LiGCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LinGHZL19, author = {Zijie Lin and Liangliang Gao and Xuexian Hu and Yuxuan Zhang and Wenfen Liu}, title = {Differentially Private Graph Clustering Algorithm Based on Structure Similarity}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {63--68}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371693}, doi = {10.1145/3371676.3371693}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LinGHZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuGCB19, author = {Bo Liu and Honghe Ge and Jinfu Chen and Qihao Bao}, title = {An Automatic Testing Platform for Object-oriented Software based on Code Coverage}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {20--24}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371702}, doi = {10.1145/3371676.3371702}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/LiuGCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuLLG19, author = {Huajun Liu and Zhanghui Liu and Yanhua Liu and Xiaoling Gao}, title = {Abnormal Network Traffic Detection based on Leaf Node Density Ratio}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {69--74}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371678}, doi = {10.1145/3371676.3371678}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuLLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuYC19, author = {Jiaxin Liu and Xuerong Yue and Zhibin Chen}, title = {A Note on Polynomial-time Solvability for Edge Packing on Graphs}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {118--122}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371691}, doi = {10.1145/3371676.3371691}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/QiSH19, author = {Yingying Qi and Wenli Shang and Xiaojun He}, title = {A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {84--91}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371704}, doi = {10.1145/3371676.3371704}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/QiSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SongHQ19, author = {Xin Song and Xue Huang and Haijun Qian}, title = {Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {137--141}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371687}, doi = {10.1145/3371676.3371687}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SongHQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZWGYF19, author = {Yucheng Wang and Daohua Zhu and Qing Wu and Yajuan Guo and Chonghai Yang and Wenjiang Feng}, title = {Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {133--136}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371686}, doi = {10.1145/3371676.3371686}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZWGYF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XiongMC19, author = {Xinli Xiong and Linru Ma and Chao Cui}, title = {Simulation Environment of Evaluation and Optimization for Moving Target Defense: {A} SimPy Approach}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {114--117}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371692}, doi = {10.1145/3371676.3371692}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XiongMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangS19, author = {Kaige Yang and Shenghui Su}, title = {Secure Email Login Based on Lightweight Asymmetric Identities}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {25--29}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371683}, doi = {10.1145/3371676.3371683}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangSXK19, author = {Ping Yang and Hui Shu and Xiaobing Xiong and Fei Kang}, title = {Semantic-based Malware Behavior Description: Past and Future}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {11--19}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371700}, doi = {10.1145/3371676.3371700}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangSXK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangT19, author = {Wu{-}Chuan Yang and Lien{-}Yuan Ting}, title = {Embedded Authentication and Blockchain in Micro-course}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {58--62}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371696}, doi = {10.1145/3371676.3371696}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangY19, author = {Chen Yang and Wei Yan}, title = {Location Privacy Protection Scheme Based on Location Services}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {30--33}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371695}, doi = {10.1145/3371676.3371695}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangYLWD19, author = {Wen Yang and Meijuan Yin and Xiaonan Liu and Can Wang and Shunran Duan}, title = {Multi-source Landmark Fusion based on Machine Learning}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {142--148}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371694}, doi = {10.1145/3371676.3371694}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangYLWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YueGC19, author = {Xuerong Yue and Jiji Gao and Zhibin Chen}, title = {A Polynomial Time Algorithm for Scheduling on Processing Time Constraints}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {109--113}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371690}, doi = {10.1145/3371676.3371690}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YueGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangDZQ19, author = {Zufa Zhang and Jianqiang Dai and Lingling Zhao and Songling Qin}, title = {A Web Services Testing Approach based on Difference Measurement and Adaptive Random Testing}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {1--5}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371703}, doi = {10.1145/3371676.3371703}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangDZQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZC19, author = {Jianing Zhang and Xingtao Zhuang and Yunfang Chen}, title = {Android Malware Detection Combined with Static and Dynamic Analysis}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {6--10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371685}, doi = {10.1145/3371676.3371685}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhouSWXT19, author = {Kaihang Zhou and Lei Shi and Jiahua Wei and Yang Xue and Jie Tang}, title = {Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {159--163}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371688}, doi = {10.1145/3371676.3371688}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhouSWXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2019, title = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676}, doi = {10.1145/3371676}, isbn = {978-1-4503-7662-4}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/0002JMY18, author = {Xiaoming Hu and Wenrong Jiang and Chuang Ma and Chengcheng Yu}, title = {Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {12--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290487}, doi = {10.1145/3290480.3290487}, timestamp = {Thu, 22 Apr 2021 18:47:33 +0200}, biburl = {https://dblp.org/rec/conf/iccns/0002JMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BaiZZHZH18, author = {Xiaodong Bai and Wendeng Zhu and Gengxin Zhang and Tao Hong and Laiding Zhao and Jing Hu}, title = {Identification Method of Power Spectral Signal Based on Fourier Series Fitting and Density Clustering}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {107--111}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290495}, doi = {10.1145/3290480.3290495}, timestamp = {Wed, 29 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/BaiZZHZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenWZL18, author = {Yunfang Chen and Que Wu and Wei Zhang and Qiangchun Liu}, title = {{SD-WAN} Source Route Based on Protocol-oblivious Forwarding}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {95--99}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290486}, doi = {10.1145/3290480.3290486}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ChenWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenXDLL18, author = {Xiong Chen and Ruliang Xiao and Xin Du and Xinhong Lin and Li Lin}, title = {Constructing {A} Novel Spark-based Distributed Maximum Frequent Sequence Pattern Mining for IoT Log}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {112--116}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290497}, doi = {10.1145/3290480.3290497}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenXDLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuHW18, author = {Yonggen Gu and Dingding Hou and Xiaohong Wu}, title = {A Cloud Storage Resource Transaction Mechanism Based on Smart Contract}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {134--138}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290499}, doi = {10.1145/3290480.3290499}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Haghighat018, author = {Mohammad Hashem Haghighat and Jun Li}, title = {Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {1--6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290484}, doi = {10.1145/3290480.3290484}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Haghighat018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/JiangXT18, author = {Yikun Jiang and Wei Xie and Yong Tang}, title = {Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {56--63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290491}, doi = {10.1145/3290480.3290491}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/JiangXT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KongHZY18, author = {Lingjing Kong and Guowei Huang and Ying Zhou and Jianfeng Ye}, title = {Fast Abnormal Identification for Large Scale Internet Traffic}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {117--120}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290498}, doi = {10.1145/3290480.3290498}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KongHZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiZQ18, author = {Shijin Li and Minchen Zhu and Yanbin Qiu}, title = {Attack Intent Analysis Method Based on Attack Path Graph}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {27--31}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290502}, doi = {10.1145/3290480.3290502}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiZQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuDL18, author = {Xiaojian Liu and Xiaofeng Dong and Qian Lei}, title = {Android Malware Detection Based on Multi-Features}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {69--73}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290493}, doi = {10.1145/3290480.3290493}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Man0L18, author = {Dapeng Man and Wu Yang and Zeya Lu}, title = {Research on Task Scheduling Model for Multi-core Processor}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {129--133}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290483}, doi = {10.1145/3290480.3290483}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Man0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Man0T18, author = {Dapeng Man and Wu Yang and Guoqing Tian}, title = {Multi-pattern Matching Algorithm based on Variable Step Size}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {125--128}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290482}, doi = {10.1145/3290480.3290482}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Man0T18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/QiuLL18, author = {Yanbin Qiu and Yanhua Liu and Shijin Li}, title = {A method of cyber risk control node selection based on Game Theory}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {32--36}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290504}, doi = {10.1145/3290480.3290504}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/QiuLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Seghier18, author = {Athmane Seghier}, title = {Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {50--55}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290490}, doi = {10.1145/3290480.3290490}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Seghier18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShenGW18, author = {Shiyu Shen and Jianlin Gao and Aitian Wu}, title = {Weakness Identification and Flow Analysis Based on Tor Network}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {90--94}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290481}, doi = {10.1145/3290480.3290481}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ShenGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SuLS18, author = {Peihuang Su and Yanhua Liu and Xiang Song}, title = {Research on Intrusion Detection Method Based on Improved Smote and XGBoost}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {37--41}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290505}, doi = {10.1145/3290480.3290505}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SuLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SunH18, author = {Haonan Sun and Rongyu He}, title = {Certification and remote attestation methods of the eTPM trusted cloud}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {42--49}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290488}, doi = {10.1145/3290480.3290488}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SunH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SunLH18, author = {Gangcan Sun and Mengge Liu and Zhuo Han}, title = {Multiple Eavesdropper-Based Physical Layer Security in {TAS/MRC} System With Antenna Correlation}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {100--106}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290489}, doi = {10.1145/3290480.3290489}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SunLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangCH18, author = {Yongchao Wang and Yuyan Chao and Lifeng He}, title = {A Study of Neighbor Users Selection in Email Networks for Spam Filtering}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {22--26}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290500}, doi = {10.1145/3290480.3290500}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZW18, author = {Chuanchuan Wang and Yonghu Zeng and Liandong Wang}, title = {A Modified Source Number Estimation Method based on Wavelet Analysis and Singular Value Decomposition}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {121--124}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290509}, doi = {10.1145/3290480.3290509}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZW18a, author = {Chuanchuan Wang and Yonghu Zeng and Liandong Wang}, title = {Mixing Matrix Estimation Method for {UBSS} based on Observed Data Segmentation}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {149--154}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290510}, doi = {10.1145/3290480.3290510}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuSYL18, author = {Cangshuai Wu and Jiangyong Shi and Yuexiang Yang and Wenhua Li}, title = {Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {74--78}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290494}, doi = {10.1145/3290480.3290494}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/WuSYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XiongXZ18, author = {Xinli Xiong and Weiguang Xu and Guangsheng Zhao}, title = {The Effectiveness Assessment for Network Based {MTD} Strategies}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {7--11}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290485}, doi = {10.1145/3290480.3290485}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XiongXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangMZ18, author = {Wei{-}Guo Zhang and Xi{-}Lin Ma and Jin{-}Zhong Zhang}, title = {Research on Kubernetes' Resource Scheduling Scheme}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {144--148}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290507}, doi = {10.1145/3290480.3290507}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangWZHL18, author = {Yuxuan Zhang and Jianghong Wei and Xiaojian Zhang and Xuexian Hu and Wenfen Liu}, title = {A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {84--89}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290503}, doi = {10.1145/3290480.3290503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangWZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZHL18, author = {Mengli Zhang and Qihui Zhang and Xuexian Hu and Wenfen Liu}, title = {A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {79--83}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290501}, doi = {10.1145/3290480.3290501}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZLHL18, author = {Xu Zhang and Shaowu Zhou and Peng Lin and Wei Huang and Wendu Li}, title = {Stability Analysis of Tail Water Slope out of the Underground Power Station in Hydropower Engineering}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {155--159}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290508}, doi = {10.1145/3290480.3290508}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZLHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Zhao18, author = {Jianfeng Zhao}, title = {Case Study: Discovering Hardware Trojans Based on model checking}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {64--68}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290492}, doi = {10.1145/3290480.3290492}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Zhao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhaoXW18, author = {Guangsheng Zhao and Xinli Xiong and Huaying Wu}, title = {A Model for Analyzing the Effectiveness of Moving Target Defense}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {17--21}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290496}, doi = {10.1145/3290480.3290496}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhaoXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengYC18, author = {Shengshi Zheng and Xuerong Yue and Zhibin Chen}, title = {Parallel Machine Scheduling with Rejection under Special Conditions}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {139--143}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290506}, doi = {10.1145/3290480.3290506}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhengYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2018, title = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480}, doi = {10.1145/3290480}, isbn = {978-1-4503-6567-3}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BayouECC17, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {wirelessOrBAC: Towards an access-control-based {IDS} for Wireless Sensor Networks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {96--103}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163077}, doi = {10.1145/3163058.3163077}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/BayouECC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChaiphetNAJGG17, author = {Chiraphat Chaiphet and Sudsanguan Ngamsuriyaroj and Ahmed Awad and Betran Jacob and Ioannis Gakos and Wiktor Grajkowski}, title = {Secure Enclave for {TLS} Web Server on Untrusted Environment}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {27--31}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163063}, doi = {10.1145/3163058.3163063}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ChaiphetNAJGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenJHCC17, author = {Sheng{-}Yu Chen and Tzung{-}Han Jeng and Chuan{-}Chiang Huang and Chien{-}Chih Chen and Kuo{-}Sen Chou}, title = {Doctrina: Annotated Bipartite Graph Mining for Malware-Control Domain Detection}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {67--75}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163061}, doi = {10.1145/3163058.3163061}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ChenJHCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuptaS17, author = {Ishu Gupta and Ashutosh Kumar Singh}, title = {A Probability based Model for Data Leakage Detection using Bigraph}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {1--5}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163060}, doi = {10.1145/3163058.3163060}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuptaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/IsmantoS17, author = {Romi Nur Ismanto and Muhammad Salman}, title = {Improving Security Level through Obfuscation Technique for Source Code Protection using {AES} Algorithm}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {18--22}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163071}, doi = {10.1145/3163058.3163071}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/IsmantoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/JeonHN17, author = {Boosun Jeon and Young{-}Jun Heo and Jung{-}Chan Na}, title = {A Retransmission Method for Improving Transmission Reliability in One-way Transmission}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {109--113}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163075}, doi = {10.1145/3163058.3163075}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/JeonHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KhanFO17, author = {Muhammad Imran Khan and Simon N. Foley and Barry O'Sullivan}, title = {On database intrusion detection: {A} Query analytics-based model of normative behavior to detect insider attacks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {12--17}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163068}, doi = {10.1145/3163058.3163068}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/KhanFO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KimS17, author = {JaeHyu Kim and JooSeok Song}, title = {A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {32--36}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163064}, doi = {10.1145/3163058.3163064}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/KimS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LashkariDKMG17, author = {Arash Habibi Lashkari and Gerard Draper{-}Gil and Jonathan Edward Keenan and Kenneth Fon Mbah and Ali A. Ghorbani}, title = {A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {59--66}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163059}, doi = {10.1145/3163058.3163059}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LashkariDKMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiGW17, author = {Huan Li and Chen Guo and Donglin Wang}, title = {Hybrid Sorting Method for Successive Cancellation List Decoding of Polar Codes}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {23--26}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163079}, doi = {10.1145/3163058.3163079}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/LiGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MandalMM17, author = {Susmita Mandal and Sujata Mohanty and Banshidhar Majhi}, title = {An ID-based Non-Interactive Deniable Authentication Protocol based on {ECC}}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {48--52}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163070}, doi = {10.1145/3163058.3163070}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MandalMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MoesriamiBarmawi17, author = {Ari Moesriami Barmawi and Dani Arumanegara}, title = {Strengthening Dynamic Identity Based Remote User Authentication Scheme Using Smart Card against Offline Password Guessing Attack}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {53--58}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163072}, doi = {10.1145/3163058.3163072}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/MoesriamiBarmawi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/RanaCADY17, author = {Khurram Gulzar Rana and Yongquan Cai and Muhammad Azeem and Allah Ditta and Haiyang Yu}, title = {Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {76--80}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163062}, doi = {10.1145/3163058.3163062}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/RanaCADY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SahooMM17, author = {Shreeya Swagatika Sahoo and Sujata Mohanty and Banshidhar Majhi}, title = {A Light Weight Three Factor based Authentication Scheme for Multi-server Environment using Smart Cards}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {43--47}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163069}, doi = {10.1145/3163058.3163069}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SahooMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShenCX17, author = {Congqi Shen and Huifang Chen and Lei Xie}, title = {Distributed Target Tracking under Byzantine Data Attacks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {114--119}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163078}, doi = {10.1145/3163058.3163078}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ShenCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangLC17, author = {Ching{-}Nung Yang and Jian{-}Ming Li and Yung{-}Shun Chou}, title = {On the Analysis of k-Secure t-Conference Key Distribution Scheme}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {91--95}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163076}, doi = {10.1145/3163058.3163076}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/YangLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangT17, author = {Wanxia Yang and Shanyu Tang}, title = {Steganalysis of {LSB} Speech with Low Embedding Rates based on Joint Probability}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {6--11}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163067}, doi = {10.1145/3163058.3163067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/YangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZG17, author = {Xueqin Zhang and Li Zhang and Chunhua Gu}, title = {Security Risk Estimation of Social Network Privacy Issue}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {81--85}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163073}, doi = {10.1145/3163058.3163073}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZG17a, author = {Xueqin Zhang and Qianru Zhou and Chunhua Gu}, title = {Published Weighted Social Networks Privacy Preservation Based on Community Division}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {86--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163074}, doi = {10.1145/3163058.3163074}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengD17, author = {Gengzhong Zheng and Xiaoqing Dong}, title = {Node Importance Evaluation in Wireless Sensor Networks based on Topology Contribution and Energy Efficiency}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {104--108}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163065}, doi = {10.1145/3163058.3163065}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhengD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhouT17, author = {Binhe Zhou and Bin Tian}, title = {Analysis and Research on Combinatorial Attack of Android Platform Applications}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {37--42}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163066}, doi = {10.1145/3163058.3163066}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ZhouT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2017, title = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3163058}, isbn = {978-1-4503-5349-6}, timestamp = {Sun, 21 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/0001BS16, author = {Monika Singh and Divya Bansal and Sanjeev Sofat}, title = {A Novel Technique to Characterize Social Network Users: Comparative Study}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {75--79}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017977}, doi = {10.1145/3017971.3017977}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/0001BS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/AhmadWG16, author = {Muhammad Aminu Ahmad and Steve Woodhead and Diane Gan}, title = {A Safeguard against Fast Self-propagating Malware}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {65--69}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017974}, doi = {10.1145/3017971.3017974}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/AhmadWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChaimaaNH16, author = {Belbergui Chaimaa and Elkamoun Najib and Rachid Hilal}, title = {A Dynamic Access Control Model for Cloud Computing Environments}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {21--29}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017979}, doi = {10.1145/3017971.3017979}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChaimaaNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChangJYRL16, author = {Rui Chang and Liehui Jiang and Qing Yin and Lu Ren and Qingfeng Liu}, title = {An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {6--10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017973}, doi = {10.1145/3017971.3017973}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChangJYRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/HasanJLC16, author = {A. S. M. Touhidul Hasan and Qingshan Jiang and Chengming Li and Lifei Chen}, title = {An Effective Model for Anonymizing Personal Location Trajectory}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {35--39}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017986}, doi = {10.1145/3017971.3017986}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/HasanJLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/IkeS16, author = {Moses Ike and Kamil Sara{\c{c}}}, title = {{PPEP:} {A} Deployable Privacy Preserving E-Commerce Protocol for Electronic Goods}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {104--112}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017983}, doi = {10.1145/3017971.3017983}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/IkeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Jin0S16, author = {Cancan Jin and Xinyu Feng and Qingni Shen}, title = {Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext Size}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {91--98}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017981}, doi = {10.1145/3017971.3017981}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Jin0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuD16, author = {Qiming Liu and Changsong Deng}, title = {An Computer Virus Spreading Model with Delayed Quarantine in Internet}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {1--5}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017972}, doi = {10.1145/3017971.3017972}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LonkarS16, author = {Bhupesh B. Lonkar and Manoj R. Sayankar}, title = {Design and Implementation of Automatic Vehicle Tracker System for Accidental Emergency}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {46--50}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017988}, doi = {10.1145/3017971.3017988}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LonkarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MaHLL16, author = {Xiangjun Ma and Lei Huang and Ye Lu and Chuanqi Li}, title = {Channel Estimation Algorithm based on Distance Judgement and Remainder Compensation in {OFDM} System}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {40--45}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017987}, doi = {10.1145/3017971.3017987}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MaHLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MadhusudhanS16, author = {R. Madhusudhan and Shashidhara}, title = {An Efficient and Secure Authentication Scheme With User Anonymity for Roaming Service in Global Mobile Networks}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {119--126}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3024085}, doi = {10.1145/3017971.3024085}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MadhusudhanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/MohanYFO16, author = {Ratish Mohan and Anis Yazidi and Boning Feng and B. John Oommen}, title = {Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {11--20}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017975}, doi = {10.1145/3017971.3017975}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/MohanYFO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/RajeshS16, author = {Harsha Mittemari Rajesh and Insu Song}, title = {E-Commerce Websites/blogs - Hassles and Predicaments}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {56--61}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017990}, doi = {10.1145/3017971.3017990}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/RajeshS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShangCWA016, author = {Wenli Shang and Junrong Cui and Ming Wan and Panfeng An and Peng Zeng}, title = {Modbus Communication Behavior Modeling and {SVM} Intrusion Detection Method}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {80--85}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017978}, doi = {10.1145/3017971.3017978}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ShangCWA016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SinghBS16, author = {Amardeep Singh and Divya Bansal and Sanjeev Sofat}, title = {A Novel Approach to Evade Attacks in Online Social Networks}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {70--74}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017976}, doi = {10.1145/3017971.3017976}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SinghBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/VanHT16, author = {Nguyen Thanh Van and Bao Ho and Tran Ngoc Thinh}, title = {An Anomaly-based Intrusion Detection Architecture Integrated on OpenFlow Switch}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {99--103}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017982}, doi = {10.1145/3017971.3017982}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/VanHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/VanithaU16, author = {C. N. Vanitha and M. Usha}, title = {Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor Networks}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {51--55}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017989}, doi = {10.1145/3017971.3017989}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/VanithaU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZYQ16, author = {Zhilong Wang and Tao Zhang and Yu Yang and Haipeng Qu}, title = {Comparison of Security Frameworks for Governmental Clouds between United States and European Union}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {30--34}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017985}, doi = {10.1145/3017971.3017985}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZYQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WibowoB16, author = {Andreyadi Wibowo and Ari Moesriami Barmawi}, title = {Improving {NORMALS} Using Modified Baudot-Murray Code}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {113--118}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017984}, doi = {10.1145/3017971.3017984}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WibowoB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XuS016, author = {Jia{-}Chang Xu and Kilho Shin and Yu{-}Lu Liu}, title = {Detecting Fake Sites based on {HTML} Structure Analysis}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {86--90}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017980}, doi = {10.1145/3017971.3017980}, timestamp = {Fri, 30 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XuS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2016, title = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971}, doi = {10.1145/3017971}, isbn = {978-1-4503-4783-9}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.