ZigBee Wireless Network Attack and Detection (Englisch)
- Neue Suche nach: Pan, Taifeng
- Neue Suche nach: Pan, Taifeng
In:
Advances in artificial intelligence and security ; Part 3
; 391-403
;
2021
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:ZigBee Wireless Network Attack and Detection
-
Beteiligte:Pan, Taifeng ( Autor:in )
-
Kongress:ICAIS ; 7. ; 2021 ; Dublin
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham, Switzerland
-
Erscheinungsdatum:2021
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Design and Implementation of Information Detection System Based on Privacy Sensitive DataChe, Jiazhen / Zhang, Chong / Xing, Xiao / Yu, Xiangzhan et al. | 2021
- 17
-
Performance Modeling of OpenMP Program Based on LLVM Compilation PlatformYang, Chen / Yu, Xiangzhan / Zhao, Yue et al. | 2021
- 31
-
A Method of Network Attack Recognition Based on CNN+LSTM ModelZheng, Changliang / Zhan, Xiaodong / Yu, Jing / Song, Wei et al. | 2021
- 45
-
Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural NetworkLin, Weiwei / Chen, Sisheng / Xue, Xingsi / Haga, Reiko et al. | 2021
- 53
-
MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation 5, Awareness and Information SharingHuang, Daochao / Wang, Lidong et al. | 2021
- 73
-
VABox: A Virtualization-Based Analysis Framework of Virtualization-Obfuscated Packed ExecutablesLiu, Zhifeng / Zheng, Desheng / Wu, Xinlong / Chen, Jixin / Tang, Xiaolan / Ran, Ziyong et al. | 2021
- 85
-
Imbalance Malware Classification by Decoupling Representation and ClassiıfierLiu, Jiayin / Zhuge, Chengchen / Wang, Oun / Guo, Xiangmin / Li, Ziyuan et al. | 2021
- 99
-
The Promotion of Online Communication Ability of Mainstream MediaYang, Xiaoxuan / Fang, Zhou / Bai, Rui / Song, Xue / Li, Rui et al. | 2021
- 112
-
HNN-Based Prediction Method Supporting Discovery of Production AbnormalSong, Xue / Fang, Zhou / Li, Rui / Yang, Xiaoxuan / Bai, Rui / Ma, Chao et al. | 2021
- 126
-
Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data SourcesMei, Lin / Xu, Chungen / Li, Lin et al. | 2021
- 140
-
A Feature Extracting and Matching System Based on Magic-Number and AC-AlgorithmWei, Xiankui / Zhang, Chong / Yu, Xiangzhan / Zhuo, Zihan et al. | 2021
- 152
-
A Review: How to Detect Malicious DomainsLi, Kang / Yu, Xiangzhan / Wang, Jiujin et al. | 2021
- 163
-
A Homomorphic Encryption Method for Power Data Based on Improved Paillier AlgorithmHe, Weimin / Zhao, Lei / Cheng, Luofei et al. | 2021
- 177
-
The Vulnerabilities in Smart Contracts: A SurveyTang, Xiangyan / Zhou, Ke / Cheng, Jieren / Li, Hui / Yuan, Yuming et al. | 2021
- 191
-
Detection of False Data Injection Attacks in Smart Grid Based on Machine LeamingXu, Li / Li, Xiaoyi / Sun, Yanbin et al. | 2021
- 204
-
An Adversarial Examples Defense Method Based on Image Low-Frequency InformationSong, ZiAn / Denz, ZhengJie et al. | 2021
- 217
-
A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural NetworkLi, Li / Bai, Rui / Zhang, Shanging / Zhou, Qili et al. | 2021
- 230
-
Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking AlgorithmLiu, Dan / Chen, Yajun / Wang, Shaokang / Bai, Yinping / Zhou, Zhaofeng et al. | 2021
- 244
-
Finding the Better Distortion Function from Prior Scheme for Image SteganographyLi, Lin / Fan, Mingyu et al. | 2021
- 254
-
Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine LeamingLing, Yuming / Wang, Zhixi / Wu, Che et al. | 2021
- 265
-
Color Image Steganography Scheme Based on Convolutional Neutral NetworkZeng, Cheng / Li, Jingbing / Zhou, Jingjun / Nawaz, Saqib Ali et al. | 2021
- 278
-
Robust JPEG Steganography Using Singular Value Decomposition in DCT DomainSong, Xiaofeng / Zhang, Yi / Du, Jia et al. | 2021
- 291
-
3D Coverless Image Steganography Scheme Based on 3D Slice TechnologyXiang, Xuyu / Liu, Qiang / Qin, Jiaohua / Tan, Yun et al. | 2021
- 301
-
Software Information Hiding Algorithm Based on Import Table of Portable Executable FileTian, Zuwei / Yang, Hengfu et al. | 2021
- 312
-
A Novel Robust Reversible Watermarking Method Against JPEG CompressionWang, Hongya / Li, Xiaolong / Xiao, Mengyao / Zhao, Yao et al. | 2021
- 323
-
A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and FusionLi, Songbin / Wang, Jingang / Yan, Qiandong / Liu, Peng / Wei, Miao et al. | 2021
- 335
-
TStego-THU: Large-Scale Text Steganalysis DatasetYang, Zhongliang / He, Jin / Zhang, Siyu / Yang, Jinshuai / Huang, Yongfeng et al. | 2021
- 347
-
Integration Innovation of Competitive Intelligence, AI and Big Data AnalysisSun, Wen / Nan, Yan / Yang, Tian Ze / Hu, Xiao Yun / Jiang, Yu et al. | 2021
- 358
-
A Comprehensive Review of IoT Technologies and Applications for HealthcareChen, Shiqi / Jin, Xuran / Zhang, Lulu / Wan, Jie et al. | 2021
- 368
-
A Pervasive Narrow-Band Internet of Things (NB-IoT) Based Health Monitoring Platform for Ambient Assisted LivingJin, Xuran / Chen, Shiqi / Zhang, Lulu / Wan, Jie et al. | 2021
- 377
-
Design and Development of Mobile Monitoring System for Forest fire FightingKia, Minna / Wang, Ying / Wang, Kuan et al. | 2021
- 391
-
ZigBee Wireless Network Attack and DetectionPan, Taifeng et al. | 2021
- 404
-
Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi ITW ScenarioTian, Z. / Yuan, X. / Yang, X. / Xie, L. et al. | 2021
- 414
-
Securing Satellite Internet of Things by Perceiving Content SemanticsRuan, Zhiqiang / Huang, Liuling / Luo, Haibo et al. | 2021
- 426
-
Research on Cultivating Senior Technical Talents Based on the Internet of Things PlatformZhao, Jian / Ma, Shenggian / Wei, Qiang / Zhang, Chao / Jiang, Chunling / Wu, Shunwei / Feng, Baitao / Han, Zhenyuan / Liu, Yi / Chang, Le et al. | 2021
- 440
-
Liquid Metal Droplet Series Based Wire OscillationYuan, Bin / Chen, Sen / Wu, Yang / Yuan, Huixin et al. | 2021
- 448
-
Linear Time-Invariant System Reduced-Order Finite-Time ObserverWu, Yang / Zhang, Jiancheng / Ye, Yuexin / Yuan, Bin et al. | 2021
- 458
-
Research on Invulnerability of WSN Based on Small World Characteristics of Complex NetworksCheng, Gongxue / Sun, Qian / Wang, Xiaoyi / Xu, Jiping / Wang, Li / Zhang, Huiyan / Yu, Jiabin / Cao, Ning et al. | 2021
- 470
-
Collaboration Energy Efficiency with Mobile Edge Computing for Target Tracking in IOTZou, Guobin / Yu, Gang / Zhang, Jian / Tang, Jian / Zhou, Junwu et al. | 2021
- 481
-
Realization of CSI-Based Human Behavior Recognition: A SurveyTang, Xinxing / Yang, Xiaolong / Zhou, Mu / Xie, Liangbo et al. | 2021
- 492
-
Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an ExampleJi, Mingtao / Liang, GuangJun / Li, Meng / Zhang, Haoyan / He, Jiacheng et al. | 2021
- 502
-
Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain TechnologyXie, Linjiang / Hang, Feilu / Lv, Yao / Guo, Wei et al. | 2021
- 514
-
Adaptive Active Immune Policy for Sensor Nodes in Internet of ThingsZhong, Cheng / Lu, Pengcheng / Guo, Shaoyong / Kang, Song et al. | 2021
- 526
-
ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization AlgorithmsCong, Sunli / Hu, Aiyun / Liu, Chen / Jiang, Zheyu et al. | 2021
- 537
-
Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral TechnologyCong, Sunli / Liu, Chen / Zhu, Zhi / Hu, Aiyun et al. | 2021
- 551
-
Robust JPEG Image Steganography Based on SVD and QIM in Stationary Wavelet DomainWang, Zhiguo / Li, Zhiyuan / Song, Xiaofeng / Zhang, Yi et al. | 2021
- 561
-
Raw Material Traceability of Industrial Control System Based on BlockchainXu, Jun / Yang, Zheming / Fang, Hongbo et al. | 2021
- 573
-
Survey: Research on Blockchain Consensus Mechanism in IoT SecurityTang, Xiangyan / Hu, Guangjing / Yuan, Yuming / Li, Hui / Zhang, Yuan / Li, Yifan / Li, Mengyang / Cheng, Jieren et al. | 2021
- 585
-
Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM AlgorithmLi, Xiaojun / Yin, Jincan / Zhang, Xiaogang / Yin, Kangda et al. | 2021
- 597
-
Optimization of Location Technology in Meteorological Wireless Sensor NetworkLi, Haichuan / Zhang, Man / Shi, Xinli / Wang, Yanzhao et al. | 2021
- 609
-
A Survey on the Applications of Wi-Fi SensingLi, Fan / Li, Chao / Lv, Yang / Xu, Haoshan / Wang, Xinhao / Yu, Zhenlei et al. | 2021
- 619
-
Efficient Partially Policy-Hidden CP-ABE for IoT Assisted Smart HealthZhang, Zhishuo / Zhang, Wei / Zhuang, Hanxiang / Sun, Yu / Qin, Zhiguang et al. | 2021
- 637
-
A Novel Hand Gesture Recognition Method for FMCW RadarShui, Yuzhu / Wang, Yong / Li, Zhaoyu / Zhou, Mu et al. | 2021
- 650
-
A Novel Blockchain-Based Revocable Permission Management on CP-ABE SchemeXv, Qianchuan / Song, Yubo / Li, Xuan / Hu, Aiqun / Wang, Junbo et al. | 2021
- 664
-
Automated Authentication of Large-Scale IoT Devices with Hybrid Feature SelectionChen, Qi / Song, Yubo / Hu, Aiqun / Wang, Junbo et al. | 2021
- 677
-
A Practical Blockchain Framework for Securing IoT ApplicationsChen, Jizhou / Cheng, Jieren / Han, Wenbao / Liu, Xianghui et al. | 2021
- 687
-
A Blockchain-Based Internet of Things Forensics ModelLiang, Guangjun / Xin, Jianfang / Wang, Qun / Ni, Xueli / Guo, Xiangmin et al. | 2021
- 697
-
Network Device Identification Based on MAC Boundary InferenceGuo, Xinmiao / Li, Xiangnan / Li, Ruixiang / Wang, Xiuting / Luo, Xiangyang et al. | 2021
- 713
-
Providing Network-Based Datasets and Multi-dimensional Features for IoT Botnet Detection ResearchYin, Jie / Wu, Xianda / Wang, Junnan / Jia, Kun / Liu, Chaoge / Shi, Yue / Cui, Xiang et al. | 2021
- 726
-
The Cross-Domain Identity Authentication Scheme Has no Trusted Authentication Center in the Cloud EnvironmentZhang, Mingming / Mao, Jiaming / Dai, Zaojian / Zhang, Yong Mingxuan / Fan, Lei / Xu, Liangjie / Hu, Jun / Wang, Angi et al. | 2021
- 739
-
A Caching Strategy Based on Content Popularity Level for NDNFeng, Min / Li, Ru / Hu, Yong / Yu, Meiju et al. | 2021