default search action
CNCERT 2020: Beijing, China
- Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou:
Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers. Communications in Computer and Information Science 1299, Springer 2020, ISBN 978-981-33-4921-6
Access Control
- Zhiqing Rui, Jingzheng Wu, Yanjie Shao, Tianyue Luo, Mutian Yang, Yanjun Wu, Bin Wu:
PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network. 3-15 - Tianpu Yang, Junshi Gao, Xiaoming Chen, Yanchun Guo, Shuo Sun:
Research on the Development Route of International Communication Accesses. 16-25
Cryptography
- Jiuling Zhang, Shijun Shen, Daochao Huang:
A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing. 29-36 - Xuguang Chen, Hongbin Ma, Pujun Ji, Haiting Liu, Yan Liu:
Based on GAN Generating Chaotic Sequence. 37-49 - Guorui Yu, Guangliang Yang, Tongxin Li, Xinhui Han, Shijie Guan, Jialong Zhang, Guofei Gu:
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks. 50-70 - Haibo Huang, Yuxi Gao, Min Yan, Xiaofan Zhang:
Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example. 71-85 - Dawei Xu, Weiqi Wang, Liehuang Zhu, Ruiguang Li:
Research Status and Prospect of Blockchain Technology in Agriculture Field. 86-93
Denial-of-Service Attacks
- Yu Rao, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou, Jinghua Bai:
Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network. 97-114
Hardware Security Implementation
- Tianpu Yang, Junshi Gao, Haitao Wang, Guangchong Dai, Rui Zhai:
Research on the Remote Deployment Design of OTN Electrical Racks. 117-129
Intrusion/Anomaly Detection and Malware Mitigation
- Jie Gu:
An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation. 133-140 - Yuqi Yu, Hanbing Yan, Yuan Ma, Hao Zhou, Hongchao Guan:
DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning. 141-161
Social Network Security and Privacy
- Huan Ma, Wei Wang:
A Label Propagation Based User Locations Prediction Algorithm in Social Network. 165-174 - Huichuan Liu, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization. 175-190
Systems Security
- Huan Cao, Lili Wu, Yue Chen, Yongtao Su, Zhengchao Lei, Chunping Zhao:
Analysis on the Security of Satellite Internet. 193-205 - Ruiguang Li, Meng Shen, Hao Yu, Chao Li, Pengyu Duan, Lihuang Zhu:
A Survey on Cyberspace Search Engines. 206-214 - Yumo Wang, Qinghua Zhang:
Brief Introduction of Network Security Asset Management for Banks. 215-221 - Xuguo Wang, Shengzhe Kan, Yeli Xu:
Embedded Security-Critical Device Resource Isolation. 222-234
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.