File Recovery of High-Order Clearing First Cluster Based on FAT32 (Englisch)
- Neue Suche nach: Chang, Xu
- Neue Suche nach: Hao, Fanchang
- Neue Suche nach: Wu, Jian
- Neue Suche nach: Feng, Guorui
- Neue Suche nach: Chang, Xu
- Neue Suche nach: Hao, Fanchang
- Neue Suche nach: Wu, Jian
- Neue Suche nach: Feng, Guorui
In:
Cyberspace safety and security ; Part 1
; 467-476
;
2019
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:File Recovery of High-Order Clearing First Cluster Based on FAT32
-
Beteiligte:Chang, Xu ( Autor:in ) / Hao, Fanchang ( Autor:in ) / Wu, Jian ( Autor:in ) / Feng, Guorui ( Autor:in )
-
Kongress:CSS ; 11. ; 2019 ; Kanton, Stadt
-
Erschienen in:Cyberspace safety and security ; Part 1 ; 467-476
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2019
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe AlgorithmXie, Xin / Wang, Bin / Wan, Tiancheng / Jiang, Xunyi / Wang, Weiru / Tang, WenLiang et al. | 2019
- 13
-
An Intrusion Detection Method Based on Hierarchical Feature Learning and Its ApplicationXie, Xin / Jiang, Xunyi / Wang, Weiru / Wang, Bin / Wan, Tiancheng / Yang, Hao et al. | 2019
- 21
-
Spoofing Attack Detection for Radar Network System State EstimationHuang, Tianqi / Wang, Buhong / Lin, Dong et al. | 2019
- 34
-
Survey of Network Security Situational AwarenessYao, Jiayu / Fan, Xiani / Cao, Ning et al. | 2019
- 45
-
Encrypting VoLTE Communication via Baseband Firmware ExtensionWang, Yao / Han, Wencong / Wang, Lianfang / Liu, Lu / Yu, Xiao et al. | 2019
- 57
-
Mitigating Link-Flooding Attack with Segment Rerouting in SDNXie, Lixia / Ding, Ying / Yang, Hongyu et al. | 2019
- 73
-
BQSV: Protecting SDN Controller Cluster’s Network Topology View Based on Byzantine Quorum System with Verification FunctionZhi, Yifang / Yang, Li / Yu, Shui / Ma, Jianfeng et al. | 2019
- 89
-
A Data Protection Scheme via Isolating Android PartitionsYang, Kai / Ma, Xiaoya / Jiang, Hongwei / Xue, Yuan / Han, Wencong / Wang, Lianfang / Liu, Lu et al. | 2019
- 102
-
A Code Protection Scheme via Inline Hooking for Android ApplicationsJiang, Hongwei / Yang, Kai / Wang, Lianfang / Gao, Jinbao / Hu, Sikang et al. | 2019
- 117
-
Log-Based Control Flow Attestation for Embedded DevicesLiu, Jingbin / Yu, Qin / Liu, Wei / Zhao, Shijun / Feng, Dengguo / Luo, Weifeng et al. | 2019
- 133
-
A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry DataDing, Kai / Wang, Chisheng / Tao, Ming / Huang, Peican et al. | 2019
- 143
-
Shuffle Dense Networks for Biometric AuthenticationZang, Huaijuan / Li, Qiuyu / Chen, Ailian / Chen, Jinlong / Zhan, Shu et al. | 2019
- 159
-
An Efficient Attribute Based Encryption Scheme in Smart GridGuan, Wenti Yang Zhitao et al. | 2019
- 173
-
Attribute-Based Signatures for Inner-Product Predicate from LatticesZhang, Yanhua / Liu, Ximeng / Hu, Yupu / Zhang, Qikun / Jia, Huiwen et al. | 2019
- 186
-
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic MapsHu, Jiaxi / Xu, Zhiqiang / He, Debiao / Zeadally, Sherali / Choo, Kim-Kwang Raymond et al. | 2019
- 203
-
Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based EncryptionXu, YuHua / Sun, ZhiXin et al. | 2019
- 214
-
ECC²: Error Correcting Code and Elliptic Curve Based CryptosystemZhang, Fangguo / Zhang, Zhuoran et al. | 2019
- 230
-
A New Provably Secure Identity-Based Multi-proxy Signature SchemeChen, Qunshan / Huang, Zhenjie / Ding, Yong / Zhou, Yuping / Huang, Hui et al. | 2019
- 245
-
A Differentially Private Trajectory Publishing Mechanism Based on Stay PointsXia, Ying / Lin, Yao / Wang, Hao et al. | 2019
- 258
-
Data Privacy Protection in Medical Alliance Chain Based on K-AnonymitySun, Hui / Huang, Cheng / Cheng, Xu / Chen, Fulong et al. | 2019
- 265
-
IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT SensorsLv, Songzhan / Liu, Yining / Sun, Jingtao et al. | 2019
- 274
-
Privacy-Awareness Fair Contract Signing Protocol Based on BlockchainWang, Dongfeng / Li, Qinghua / Li, Fengyin / Zhang, Quanxin / Xu, Banghai et al. | 2019
- 279
-
Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc NetworksShanGuo, Lv et al. | 2019
- 289
-
Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge ComputingLuo, Jun / Liu, Hong / Cheng, Qianyang et al. | 2019
- 307
-
DeT: Defending Against Adversarial Examples via Decreasing TransferabilityLi, Changjiang / Weng, Haiqin / Ji, Shouling / Dong, Jianfeng / He, Qinming et al. | 2019
- 323
-
ADS-B Data Attack Detection Based on Generative Adversarial NetworksLi, Tengyao / Wang, Buhong / Shang, Fute / Tian, Jiwei / Cao, Kunrui et al. | 2019
- 337
-
Stealthy and Sparse False Data Injection Attacks Based on Machine LearningTian, Jiwei / Wang, Buhong / Li, Tengyao / Shang, Fute / Cao, Kunrui / Li, Jing et al. | 2019
- 348
-
Automated Detection System for Adversarial Examples with High-Frequency Noises SieveThang, Dang Duy / Matsui, Toshihiro et al. | 2019
- 363
-
An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home AssistantAi, Haojun / Wang, Yifeng / Yang, Yuhong / Zhang, Quanxin et al. | 2019
- 374
-
Evading PDF Malware Classifiers with Generative Adversarial NetworkWang, Yaxiao / Li, Yuanzhang / Zhang, Quanxin / Hu, Jingjing / Kuang, Xiaohui et al. | 2019
- 391
-
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine LearningLiu, YuYi / Zavarsky, Pavol / Malik, Yasir et al. | 2019
- 407
-
Another Look at a Proposed Cubic Chaotic MappingWu, Qi et al. | 2019
- 413
-
Research on Drug Regulation Mode in the Age of the Internet of ThingsZhao, Yan / Liu, HuWei / Cao, Ning et al. | 2019
- 425
-
Privacy-Aware Service Migration for Edge Computing in Urban CitiesLiu, Xihua / Qi, Lianyong / Xu, Xiaolong / Zhang, Xuryun / Wan, Shaohua et al. | 2019
- 437
-
A Certificateless Aggregate Signature Scheme Based on Blockchain for EMRShu, Hong / Chen, Fulong / Xie, Dong / Qi, Ping / Huang, Yongqing et al. | 2019
- 444
-
The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social DevelopmentDu, Meifang / Zhu, Haojia et al. | 2019
- 457
-
Big Data Based E-commerce Search Advertising RecommendationTao, Ming / Huang, Peican / Li, Xueqiang / Ding, Kai et al. | 2019
- 467
-
File Recovery of High-Order Clearing First Cluster Based on FAT32Chang, Xu / Hao, Fanchang / Wu, Jian / Feng, Guorui et al. | 2019
- 477
-
Mobile Recommendation Method for Fusing Item Features and User Trust RelationshipLv, Shanguo et al. | 2019
- 489
-
Research on Collaborative Filtering Recommendation Method Based on Context and User CredibilityChen, Hongli / Lv, Shanguo et al. | 2019
- 501
-
Multi-watermarking Algorithm for Medical Image Based on NSCT-RDWT-DCTZhou, Jingjun / Li, Jingbing / Li, Hui / Liu, Jing / Liu, Jialing / Dai, Qianning / Nawaz, Saqib Ali et al. | 2019
- 516
-
An Improved Container Scheduling Algorithm Based on PSO for Big Data ApplicationsLi, Jiawei / Liu, Bo / Lin, Weiwei / Li, Pengfei / Gao, Qian et al. | 2019
- 533
-
A Secure Density Peaks Clustering Algorithm on Cloud ComputingCi, Shang / Sun, Liping / Liu, Xiaoqing / Du, Tingli / Zheng, Xiaoyao et al. | 2019
- 542
-
Research on Cloud Computing Security Problems and Protection CountermeasuresFan, Xiani / Yao, Jiayu / Cao, Ning et al. | 2019
- 552
-
Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud ComputingLiu, Huwei / Zhao, Yan / Cao, Ning et al. | 2019
- 562
-
Cloud Security Solution Based on Software Defined NetworkZhao, Shengli / Li, Zhaochan / Cao, Ning et al. | 2019
- 575
-
An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage ApplicationsLin, Wenmin / Sheng, Xuan / Qi, Lianyong et al. | 2019
- 585
-
A Blockchain Based Searchable Encryption Scheme for Multiple Cloud StorageZhang, Chao / Fu, Shaojing / Ao, Weijun et al. | 2019