The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Security and Communication Networks"( http://dblp.L3S.de/Venues/Security_and_Communication_Networks )

URL (DBLP): http://dblp.uni-trier.de/db/journals/scn

Publication years (Num. hits)
2008 (43) 2009 (51) 2010 (42) 2011 (118) 2012 (128) 2013 (134) 2014 (226) 2015 (354) 2016 (475) 2017 (156) 2018 (294) 2019 (45)
Publication types (Num. hits)
article(2066)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 2066 publication records. Showing 2066 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Maurantonio Caprolu, Simone Raponi, Roberto Di Pietro FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Édgar Salguero Dorokhin, Walter Fuertes, Edison Lascano On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Rashid Abbasi, Lixiang Xu, Farhan Amin, Bin Luo 0001 Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Darong Huang, Lanyan Ke, Bo Mi, Guosheng Wei, Jian Wang, Shaohua Wan A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohamed Ali Hajjaji, Mohamed Gafsi, Abdessalem Ben Abdelali, Abdellatif Mtibaa FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1JingJing Wang, Yiliang Han, Xiaoyuan Yang 0002, Tanping Zhou, Jiayong Chen A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Han Zhang, Yuanbo Guo, Tao Li Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mingfu Xue, Chengxiang Yuan, Zhe Liu, Jian Wang SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ángel Martín del Rey, Lu-Xing Yang, Vasileios Karyotis Mathematical Models for Malware Propagation. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xiaoye Li, Jing Yang 0010, Zhenlong Sun, Jianpei Zhang Differentially Private Release of the Distribution of Clustering Coefficients across Communities. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wenli Shang, Tianyu Gong, Chunyu Chen, Jing Hou, Peng Zeng 0001 Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Baodong Qin Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida, Yoichi Hata A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos, Bruno Bogaz Zarpelão Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Haiying Ma, Zhanjun Wang, Zhijin Guan Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Viet Cuong Trinh A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jin Wook Byun A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Laurence T. Yang, Wei Wang 0088, Gregorio Martínez Pérez, Willy Susilo Security, Privacy, and Trust for Cyberphysical-Social Systems. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuntao Zhao, Bo Bo, Yongxin Feng, ChunYu Xu, Bo Yu A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Fute Shang, Buhong Wang, Fuhu Yan, Tengyao Li Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhenjun Tang, Ye Yang, Shijie Xu, Chunqiang Yu, Xianquan Zhang Image Encryption with Double Spiral Scans and Chaotic Maps. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Meiyu Zhang, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Liran Ma, Yan Huo, Chunqiang Hu, Wei Li 0059 Security and Privacy for Smart Cyber-Physical Systems. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Soultana Ellinidou, Gaurav Sharma 0006, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch, Jean-Michel Dricot SSPSoC: A Secure SDN-Based Protocol over MPSoC. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bin Ma, Bing Li, Xiao-Yu Wang, Chun-Peng Wang, Jian Li, Yun-Qing Shi Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ming Xu, Weili Han An Explainable Password Strength Meter Addon via Textual Pattern Recognition. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, Ingrid Verbauwhede Single-Round Pattern Matching Key Generation Using Physically Unclonable Function. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wenting Shen, Jing Qin 0002, Jixin Ma A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yubiao Wang, Junhao Wen, Xibin Wang, Bamei Tao, Wei Zhou A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yong-Seok Lee, Young-Ho Seo, Dong-Wook Kim Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Guoyan Huang, Qian Wang 0009, Liu Xinqian, Hao Xiaobing, Yan Huaizhi Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jiadong Ren, Zhangqi Zheng, Qian Liu, Zhiyao Wei, Huaizhi Yan A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xu Wang 0004, Bo Song, Wei Ni 0001, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jian Sun, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, Xiaojiang Du Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Marcin Luckner Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gustav Sourek, Filip Zelezný Efficient Extraction of Network Event Types from NetFlows. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Teng Hu, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, Yuan Liu An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hyun-A. Park Secure Information Sharing System for Online Patient Networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dhanu Dwiardhika, Takuji Tachibana Virtual Network Embedding Based on Security Level with VNF Placement. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yunxue Yan, Lei Wu, Wenyu Xu, Hao Wang 0007, Zhao Man Liu Integrity Audit of Shared Cloud Data with Identity Tracking. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shuang Zhao, Shuhui Chen, Yipin Sun, Zhiping Cai, Jinshu Su Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. Search on Bibsonomy Security and Communication Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kholoud Al-Saleh, Abdelfettah Belghith Practical Suitability and Experimental Assessment of Tree ORAMs. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhen Zhang, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, Jin Wang 0014 An Ensemble Learning Method for Wireless Multimedia Device Identification. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qianqian Yang 0003, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun On the Complexity of Impossible Differential Cryptanalysis. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1So Ryoung Park, Ilku Nam, Sanguk Noh Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sahel Alouneh, Feras Al-Hawari, Ismail Hababeh, Gheorghita Ghinea An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michal Trnka, Tomás Cerný, Nathaniel Stickney Survey of Authentication and Authorization for the Internet of Things. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erxue Min, Jun Long, Qiang Liu 0004, Jianjing Cui, Wei Chen TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Won Park, Youngin You, Kyungho Lee Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ye Yuan 0003, Liji Wu, Yijun Yang, Xiangmin Zhang A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Inwoo Ro, Joong Soo Han, Eul Gyu Im Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Run Xie, Chanlian He, Dongqing Xie, Chongzhi Gao, Xiaojun Zhang A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dahee Choi, Kyungho Lee An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Li, Jiazhe Chen, An Wang, Xiaoyun Wang Analysis of Software Implemented Low Entropy Masking Schemes. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1HyunSeo Kang, YoonJe Sung, HyoungJun Kwon, SugJoon Yoon, SangYeong Choi An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rahul Saha, G. Geetha, Gulshan Kumar, Tai-Hoon Kim RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shahid Mahmood, Shabieh Farwa, Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiameng Sun, Binrui Zhu, Jing Qin 0002, Jiankun Hu, Jixin Ma Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Debiao He A General Architecture for Multiserver Authentication Key Agreement with Provable Security. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tanping Zhou, Ningbo Li, Xiaoyuan Yang 0002, Liqun Lv, Yitao Ding, Xu An Wang Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ping Zhang 0020, Honggang Hu, Qian Yuan Close to Optimally Secure Variants of GCM. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Youngho Park 0004, Chul Sur, Kyung-Hyune Rhee A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xin Wang, Bo Yang 0003, Zhe Xia, Yanqi Zhao, Huifang Yu A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ali El Ksimi, Leghris Cherkaoui Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jinbao Wang, Ling Tian, Yan Huang, Donghua Yang, Hong Gao Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan Validating User Flows to Protect Software Defined Network Environments. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yu Yao, Qiang Fu 0005, Wei Yang, Ying Wang, Chuan Sheng An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ke Yin A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhen-Hao Zhang, Yurong Song, Ling-Ling Xia, Yinwei Li, Liang Zhang 0015, Guo-Ping Jiang A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Irene Arsuaga, Nerea Toledo, Igor Lopez, Marina Aguado A Framework for Vulnerability Detection in European Train Control Railway Communications. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Alireza Poostindouz, Viliam Lisý Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dongdong Zhao, Shu Fang, Jianwen Xiang, Jing Tian, Shengwu Xiong Iris Template Protection Based on Local Ranking. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nancy Agarwal, Syed Zeeshan Hussain A Closer Look at Intrusion Detection System for Web Applications. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kyle Coffey, Richard Smith 0002, Leandros A. Maglaras, Helge Janicke Vulnerability Analysis of Network Scanning on SCADA Systems. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jian Song, Guangsong Li, Bo-ru Xu, Chuangui Ma A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hui Xia, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng Towards a Novel Trust-Based Multicast Routing for VANETs. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaodan Gu, Ming Yang 0001, Yiting Zhang, Peilong Pan, Zhen Ling Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiajing Wang, Rui Ma 0004, Bowen Dou, Zefeng Jian, Hongzhou Chen OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jingtao Li, Yang Liu 0104, Wengang Pei, Zhen Cao Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Riccardo Pecori, Luca Veltri A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yanan Chen, Zhenyu Lu, Hu Xiong, Weixiang Xu Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Songjie Wei, Shuai Li 0006, Peilong Liu, Meilin Liu BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gábor Danner, Árpád Berta, István Hegedüs, Márk Jelasity Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tomás Bajtos, Andrej Gajdos, Lenka Kleinova, Katarína Lucivjanská, Pavol Sokol Network Intrusion Detection with Threat Agent Profiling. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuyun Zhang, Julian Jang-Jaccard, Lianyong Qi, Md. Zakirul Alam Bhuiyan, Chang Liu Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhenyan Liu, Yifei Zeng, Pengfei Zhang, Jingfeng Xue, Ji Zhang, Jiangtao Liu An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huifang Yu, Zhicang Wang, Jianmin Li, Xinzhe Gao Identity-Based Proxy Signcryption Protocol with Universal Composability. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fangfang Shan, Hui Li 0006, Fenghua Li, Yunchuan Guo, Ben Niu 0001 HAC: Hybrid Access Control for Online Social Networks. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michele De Donno, Nicola Dragoni, Alberto Giaretta, Angelo Spognardi DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Youwen Zhu, Yue Zhang, Jiabin Yuan, Xianmin Wang FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Baraka D. Sija, Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, Myung-Sup Kim A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiufeng Zhao, Ailan Wang Generalized Bootstrapping Technique Based on Block Equality Test Algorithm. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ruixiang Li, Yuchen Sun, Jianwei Hu, Te Ma, Xiangyang Luo Street-Level Landmark Evaluation Based on Nearest Routers. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chong Fu, Gao-yuan Zhang, Mai Zhu, Zhe Chen, Weimin Lei A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. Search on Bibsonomy Security and Communication Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2066 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license