The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SSIC"( http://dblp.L3S.de/Venues/SSIC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ssic

Publication years (Num. hits)
2015 (23) 2016 (15) 2018 (30)
Publication types (Num. hits)
inproceedings(65) proceedings(3)
Venues (Conferences, Journals, ...)
SSIC(68)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 68 publication records. Showing 68 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yunlong Hu, Ping Yi, Yu Sui, Zongrui Zhang, Yao Yao 0009, Wei Wang 0190, Ting Zhu 0001 Dispatching and Distributing Energy in Energy Internet under Energy Dilemma. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Monteuuis, Jonathan Petit, Jun Zhang 0019, Houda Labiod, Stefano Mafrica, Alain Servel "My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhutian Feng, Cunqing Hua Machine Learning-based RF Jamming Detection in Wireless Networks. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Danhua Huang, Li Pan An Improved Group-based Influence Maximization Method in Social Networks. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Liang Hui, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Hongyuan Chen, Yunong Liang VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chih-Wei Shiu, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji Data Hiding for Color Image by Rubik's Cube. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Junhua Tang, Shuli Zhao, Yue Wu 0010, Jianhua Li 0001 Caching Strategy for Scalable Video Coding in Information-Centric Networking. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yu Chen, Sheng Yan, Tianyu Pang, Rui Chen Detection of DGA Domains Based on Support Vector Machine. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Achraf Fayad, Badis Hammi, Rida Khatoun An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lei Sun, Shuai Li, Songhui Guo, Yingxin Xu Performance Modeling towards Interrupt System of Virtualized Cryptography Device. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Han Qiu 0001, Nathalie Enfrin, Gérard Memmi A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gaobo Sun, Shuyu Li, Zhanchun Kang Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yishuang Meng, Ping Yi, Xuejun Guo, Wen Gu, Xin Liu, Wei Wang 0190, Ting Zhu 0001 Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning Framework. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuxuan Luo, Shaoyin Cheng, Chong Liu, Fan Jiang PU Learning in Payload-based Web Anomaly Detection. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yaobin Xie, Wei Wang, Faren Wang, Rui Chang VTET: A Virtual Industrial Control System Testbed for Cyber Security Research. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peng Zhang, Shaoyin Cheng, Songhao Lou, Fan Jiang 0005 A Novel Android Malware Detection Approach Using Operand Sequences. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Caleb Riggs, Tanner Douglas, Kanwalinderjit Gagneja Image Mapping through Metadata. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jianguo Zheng, Li Pan Least Cost Rumor Community Blocking optimization in Social Networks. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qingyuan Li, Hao Wu 0005, Lei Liu, Bin Pan, Lan Dong A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1 Third International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018, Shanghai, China, October 18-19, 2018 Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  BibTeX  RDF
1Chenbin Wu, Yunjie Zhou, Xiaojuan Jiang, Yinbai Xu, Xiaodi Wang, He He 0002 Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power Cables. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Boren He, Futai Zou, Yue Wu 0010 Multi-SDN Based Cooperation Scheme for DDoS Attack Defense. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huijie Lian, Guangbo Wang, Qingxian Wang Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hong-Beom Choi, Young-Bae Ko, Keun-Woo Lim Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhihong Zhou, Lihong Yao, Jianhua Li, Bin Hu, Chen Wang, Zhenglong Wang Classification of botnet families based on features self-learning under Network Traffic Censorship. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaoliang Wang, Junhua Tang, Mengdi Yu, Gubei Yin, Jianhua Li 0001 A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mengyi Chen, Li Pan Least Cost Precision Marketing Based on User Profiles in Social Networks. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuelei Wang, Ernest Foo Assessing Industrial Control System Attack Datasets for Intrusion Detection. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adja Elloh Yves-Christian, Badis Hammi, Ahmed Serhrouchni, Houda Labiod Total Eclipse: How To Completely Isolate a Bitcoin Peer. Search on Bibsonomy SSIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Junhua Tang, Shujun Lin, Cunqing Hua, Yue Wu 0010, Jianhua Li 0001 Channel aware resource allocation for device-to-device communication underlaying cellular networks. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vasileios Gkioulos, Stephen D. Wolthusen Securing tactical service oriented architectures. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yongkai Zhou, Hang Yuan, Lijun Zu, Guobao Liu, Ge Li Multiple SDN controller orchestration for financial cloud. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peng Chen, Weini Zeng, Yong Zhu, Yingyan Gu Secure range query based on privacy-preserving function in two-tiered sensor networks. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jun Zhang 0019, Houda Labiod, Mengying Ren, Hengchuan Tan Cooperation behavior of vehicles in an evolutionary game for information dissemination. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yutao Zhang, Gongshen Liu, Jun Wu 0001, Jianhua Li 0001, Longhua Guo Toward interests drift mechanism for social network. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pengze Guo, Zhi Xue Improved task partition based fault-tolerant rate-monotonic scheduling algorithm. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahmad Shahrafidz Khalid, Emmanuel Conchon, Fabrice Peyrard Evaluation of RAIN RFID authentication schemes. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yue Lu, Xiuzhen Chen, Changsong Chen 0002 Security authentication mechanism based on symmetric polynomials for SCADA systems. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shiyong Zhang, Gongliang Chen, Jianhua Li 0001 Cube attack on reduced-round Enhanced-Bivium. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrei F. Klein, Mihai Stefanescu, Alan Saied, Kurt Swakhoven The performance impact of encryption in an asynchronous cloud environment. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Badis Hammi, Mohamed Cherif Rahal, Rida Khatoun Clustering methods comparison: Application to source based detection of botclouds. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Khawla Asmi, Dounia Lotfi, Mohamed El Marraki An approach based on the clustering coefficient for the community detection in social networks. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2016, Paris, France, July 18-19, 2016 Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  BibTeX  RDF
1Siye Wang, Shiyong Zhang, Lifeng Liu, Gongliang Chen A challenge-response authentication for RFID using Enhanced-Trivium. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Huangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen 0002 Classified security protection evaluation for vehicle information system. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Xiuzhen Chen Bayesian-based model for a reputation system in vehicular networks. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yanan Wang, Xiuzhen Chen, Jianhua Li 0001 A new genetic-based rumor diffusion model for social networks. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fouad Amine Guenane, Ahmed Serhrouchni Secure access & authentication for collaborative intercloud exchange service. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Prateek Singh, Saurabh Garg, Vinod Kumar, Zia Saquib A testbed for SCADA cyber security and intrusion detection. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou Overview of cyber-security of industrial control system. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rida Khatoun, P. Gut, R. Doulami, Lyes Khoukhi, Ahmed Serhrouchni A reputation system for detection of black hole attack in vehicular networking. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zongshuai Hu, Yong Wang, Chunhua Gu, Dejun Mengm, Xiaoli Yang, Shuai Chen Malicious data identification in smart grid based on residual error method. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Li-Xiong Zheng, Xiao-Lin Xu, Jia Li, Lu Zhang, Xuan-Chen Pan, Zhi-Yuan Ma, Li-Hong Zhang Malicious URL prediction based on community detection. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Heng Chuan Tan, Jun Zhang 0019, Maode Ma, Peter Han Joo Chong, Houda Labiod Secure Public Key Regime (SPKR) in vehicular networks. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti Flooding attacks detection in MANETs. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni Survey on packet marking fields and information for IP traceback. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel Analysis of cyber security for industrial control systems. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paul Wang, Amjad Ali 0010, William Kelly Data security and threat modeling for smart city infrastructure. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tubagus Mohammad Akhriza, Yinghua Ma, Jianhua Li A novel Fibonacci windows model for finding emerging patterns over online data stream. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gérard Memmi, Katarzyna Kapusta, Han Qiu 0001 Data protection: Combining fragmentation, encryption, and dispersion. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lina Zhu, Zuochang Zhan A random key management scheme for heterogeneous wireless sensor network. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, Shanghai, China, August 5-7, 2015 Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  BibTeX  RDF
1Andreas Brauchli, Depeng Li 0002 A solution based analysis of attack vectors on smart home systems. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mounira Msahli, Mohamed Tahar Hammi, Ahmed Serhrouchni Safe box cloud authentication using TLS extesion. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yue Wu 0010, Fanchao Meng, Guanghao Wang, Ping Yi A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue Security in MIMO wireless hybrid channel with artificial noise. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dhavy Gantsou On the use of security analytics for attack detection in vehicular ad hoc networks. Search on Bibsonomy SSIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #68 of 68 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license