


default search action
CNCERT 2020: Beijing, China
- Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou:

Cyber Security - 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers. Communications in Computer and Information Science 1299, Springer 2020, ISBN 978-981-33-4921-6
Access Control
- Zhiqing Rui

, Jingzheng Wu, Yanjie Shao, Tianyue Luo, Mutian Yang, Yanjun Wu, Bin Wu:
PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network. 3-15 - Tianpu Yang, Junshi Gao, Xiaoming Chen, Yanchun Guo, Shuo Sun:

Research on the Development Route of International Communication Accesses. 16-25
Cryptography
- Jiuling Zhang, Shijun Shen, Daochao Huang:

A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing. 29-36 - Xuguang Chen, Hongbin Ma, Pujun Ji, Haiting Liu, Yan Liu:

Based on GAN Generating Chaotic Sequence. 37-49 - Guorui Yu, Guangliang Yang, Tongxin Li, Xinhui Han, Shijie Guan, Jialong Zhang, Guofei Gu:

MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks. 50-70 - Haibo Huang

, Yuxi Gao
, Min Yan
, Xiaofan Zhang
:
Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example. 71-85 - Dawei Xu, Weiqi Wang, Liehuang Zhu, Ruiguang Li:

Research Status and Prospect of Blockchain Technology in Agriculture Field. 86-93
Denial-of-Service Attacks
- Yu Rao, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou, Jinghua Bai:

Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network. 97-114
Hardware Security Implementation
- Tianpu Yang, Junshi Gao, Haitao Wang, Guangchong Dai, Rui Zhai:

Research on the Remote Deployment Design of OTN Electrical Racks. 117-129
Intrusion/Anomaly Detection and Malware Mitigation
- Jie Gu:

An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation. 133-140 - Yuqi Yu, Hanbing Yan, Yuan Ma, Hao Zhou, Hongchao Guan:

DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning. 141-161
Social Network Security and Privacy
- Huan Ma, Wei Wang:

A Label Propagation Based User Locations Prediction Algorithm in Social Network. 165-174 - Huichuan Liu, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:

Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization. 175-190
Systems Security
- Huan Cao, Lili Wu, Yue Chen, Yongtao Su, Zhengchao Lei, Chunping Zhao:

Analysis on the Security of Satellite Internet. 193-205 - Ruiguang Li, Meng Shen, Hao Yu, Chao Li, Pengyu Duan, Lihuang Zhu:

A Survey on Cyberspace Search Engines. 206-214 - Yumo Wang, Qinghua Zhang:

Brief Introduction of Network Security Asset Management for Banks. 215-221 - Xuguo Wang, Shengzhe Kan, Yeli Xu:

Embedded Security-Critical Device Resource Isolation. 222-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














