ZigBee Wireless Network Attack and Detection (Englisch)
- Neue Suche nach: Pan, Taifeng
- Weitere Informationen zu Pan, Taifeng:
-
https://orcid.org/http://orcid.org/0000-0001-7696-8382
- Neue Suche nach: Sun, Xingming
- Weitere Informationen zu Sun, Xingming:
-
https://orcid.org/https://orcid.org/0000-0003-1390-399X
- Neue Suche nach: Zhang, Xiaorui
- Weitere Informationen zu Zhang, Xiaorui:
-
https://orcid.org/https://orcid.org/0000-0002-7571-2593
- Neue Suche nach: Xia, Zhihua
- Weitere Informationen zu Xia, Zhihua:
-
https://orcid.org/https://orcid.org/0000-0001-6860-647X
- Neue Suche nach: Bertino, Elisa
- Weitere Informationen zu Bertino, Elisa:
-
https://orcid.org/https://orcid.org/0000-0002-4029-7051
- Neue Suche nach: Pan, Taifeng
- Weitere Informationen zu Pan, Taifeng:
-
https://orcid.org/http://orcid.org/0000-0001-7696-8382
In:
Advances in Artificial Intelligence and Security
: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III
;
Kapitel: 32
;
391-403
;
2021
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:ZigBee Wireless Network Attack and Detection
-
Weitere Titelangaben:Communic.Comp.Inf.Science
-
Beteiligte:Sun, Xingming ( Herausgeber:in ) / Zhang, Xiaorui ( Herausgeber:in ) / Xia, Zhihua ( Herausgeber:in ) / Bertino, Elisa ( Herausgeber:in ) / Pan, Taifeng ( Autor:in )
-
Kongress:International Conference on Artificial Intelligence and Security ; 2021 ; Dublin, Ireland
-
Erschienen in:Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III ; Kapitel: 32 ; 391-403Communications in Computer and Information Science ; 1424 ; 391-403
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:29.06.2021
-
Format / Umfang:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Design and Implementation of Information Detection System Based on Privacy Sensitive DataChe, Jiazhen / Zhang, Chong / Xing, Xiao / Yu, Xiangzhan et al. | 2021
- 2
-
Performance Modeling of OpenMP Program Based on LLVM Compilation PlatformYang, Chen / Yu, Xiangzhan / Zhao, Yue et al. | 2021
- 3
-
A Method of Network Attack Recognition Based on CNN+LSTM ModelZheng, Changliang / Zhan, Xiaodong / Yu, Jing / Song, Wei et al. | 2021
- 4
-
Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural NetworkLin, Weiwei / Chen, Sisheng / Xue, Xingsi / Haga, Reiko et al. | 2021
- 5
-
MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information SharingHuang, Daochao / Wang, Lidong et al. | 2021
- 6
-
VABox: A Virtualization-Based Analysis Framework of Virtualization-Obfuscated Packed ExecutablesLiu, Zhifeng / Zheng, Desheng / Wu, Xinlong / Chen, Jixin / Tang, Xiaolan / Ran, Ziyong et al. | 2021
- 7
-
Imbalance Malware Classification by Decoupling Representation and ClassifierLiu, Jiayin / Zhuge, Chengchen / Wang, Qun / Guo, Xiangmin / Li, Ziyuan et al. | 2021
- 8
-
The Promotion of Online Communication Ability of Mainstream MediaYang, Xiaoxuan / Fang, Zhou / Bai, Rui / Song, Xue / Li, Rui et al. | 2021
- 9
-
HNN-Based Prediction Method Supporting Discovery of Production AbnormalSong, Xue / Fang, Zhou / Li, Rui / Yang, Xiaoxuan / Bai, Rui / Ma, Chao et al. | 2021
- 10
-
Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data SourcesMei, Lin / Xu, Chungen / Li, Lin et al. | 2021
- 11
-
A Feature Extracting and Matching System Based on Magic-Number and AC-AlgorithmWei, Xiankui / Zhang, Chong / Yu, Xiangzhan / Zhuo, Zihan et al. | 2021
- 12
-
A Review: How to Detect Malicious DomainsLi, Kang / Yu, Xiangzhan / Wang, Jiujin et al. | 2021
- 13
-
A Homomorphic Encryption Method for Power Data Based on Improved Paillier AlgorithmHe, Weimin / Zhao, Lei / Cheng, Luofei et al. | 2021
- 14
-
The Vulnerabilities in Smart Contracts: A SurveyTang, Xiangyan / Zhou, Ke / Cheng, Jieren / Li, Hui / Yuan, Yuming et al. | 2021
- 15
-
Detection of False Data Injection Attacks in Smart Grid Based on Machine LearningXu, Li / Li, Xiaoyi / Sun, Yanbin et al. | 2021
- 16
-
An Adversarial Examples Defense Method Based on Image Low-Frequency InformationSong, ZiAn / Deng, ZhengJie et al. | 2021
- 17
-
A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural NetworkLi, Li / Bai, Rui / Zhang, Shanqing / Zhou, Qili et al. | 2021
- 18
-
Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking AlgorithmLiu, Dan / Chen, Yajun / Wang, Shaokang / Bai, Yinping / Zhou, Zhaofeng et al. | 2021
- 19
-
Finding the Better Distortion Function from Prior Scheme for Image SteganographyLi, Lin / Fan, Mingyu et al. | 2021
- 20
-
Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine LearningLing, Yuming / Wang, Zhixi / Wu, Che et al. | 2021
- 21
-
Color Image Steganography Scheme Based on Convolutional Neural NetworkZeng, Cheng / Li, Jingbing / Zhou, Jingjun / Nawaz, Saqib Ali et al. | 2021
- 22
-
Robust JPEG Steganography Using Singular Value Decomposition in DCT DomainSong, Xiaofeng / Zhang, Yi / Du, Jia et al. | 2021
- 23
-
3D Coverless Image Steganography Scheme Based on 3D Slice TechnologyXiang, Xuyu / Liu, Qiang / Qin, Jiaohua / Tan, Yun et al. | 2021
- 24
-
Software Information Hiding Algorithm Based on Import Table of Portable Executable FileTian, Zuwei / Yang, Hengfu et al. | 2021
- 25
-
A Novel Robust Reversible Watermarking Method Against JPEG CompressionWang, Hongya / Li, Xiaolong / Xiao, Mengyao / Zhao, Yao et al. | 2021
- 26
-
A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and FusionLi, Songbin / Wang, Jingang / Yan, Qiandong / Liu, Peng / Wei, Miao et al. | 2021
- 27
-
TStego-THU: Large-Scale Text Steganalysis DatasetYang, Zhongliang / He, Jin / Zhang, Siyu / Yang, Jinshuai / Huang, Yongfeng et al. | 2021
- 28
-
Integration Innovation of Competitive Intelligence, AI and Big Data AnalysisSun, Wen / Nan, Yan / Yang, Tian Ze / Hu, Xiao Yun / Jiang, Yu et al. | 2021
- 29
-
A Comprehensive Review of IoT Technologies and Applications for HealthcareChen, Shiqi / Jin, Xuran / Zhang, Lulu / Wan, Jie et al. | 2021
- 30
-
A Pervasive Narrow-Band Internet of Things (NB-IoT) Based Health Monitoring Platform for Ambient Assisted LivingJin, Xuran / Chen, Shiqi / Zhang, Lulu / Wan, Jie et al. | 2021
- 31
-
Design and Development of Mobile Monitoring System for Forest Fire FightingXia, Minna / Wang, Ying / Wang, Kuan et al. | 2021
- 32
-
ZigBee Wireless Network Attack and DetectionPan, Taifeng et al. | 2021
- 33
-
Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW ScenarioTian, Z. / Yuan, X. / Yang, X. / Xie, L. et al. | 2021
- 34
-
Securing Satellite Internet of Things by Perceiving Content SemanticsRuan, Zhiqiang / Huang, Liuling / Luo, Haibo et al. | 2021
- 35
-
Research on Cultivating Senior Technical Talents Based on the Internet of Things PlatformZhao, Jian / Ma, Shengqian / Wei, Qiang / Zhang, Chao / Jiang, Chunling / Wu, Shunwei / Feng, Baitao / Han, Zhenyuan / Liu, Yi / Chang, Le et al. | 2021
- 36
-
Liquid Metal Droplet Series Based Wire OscillationYuan, Bin / Chen, Sen / Wu, Yang / Yuan, Huixin et al. | 2021
- 37
-
Linear Time-Invariant System Reduced-Order Finite-Time ObserverWu, Yang / Zhang, Jiancheng / Ye, Yuexin / Yuan, Bin et al. | 2021
- 38
-
Research on Invulnerability of WSN Based on Small World Characteristics of Complex NetworksCheng, Gongxue / Sun, Qian / Wang, Xiaoyi / Xu, Jiping / Wang, Li / Zhang, Huiyan / Yu, Jiabin / Cao, Ning et al. | 2021
- 39
-
Collaboration Energy Efficiency with Mobile Edge Computing for Target Tracking in IoTZou, Guobin / Yu, Gang / Zhang, Jian / Tang, Jian / Zhou, Junwu et al. | 2021
- 40
-
Realization of CSI-Based Human Behavior Recognition: A SurveyTang, Xinxing / Yang, Xiaolong / Zhou, Mu / Xie, Liangbo et al. | 2021
- 41
-
Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an ExampleJi, Mingtao / Liang, GuangJun / Li, Meng / Zhang, Haoyan / He, Jiacheng et al. | 2021
- 42
-
Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain TechnologyXie, Linjiang / Hang, Feilu / Lv, Yao / Guo, Wei et al. | 2021
- 43
-
Adaptive Active Immune Policy for Sensor Nodes in Internet of ThingsZhong, Cheng / Lu, Pengcheng / Guo, Shaoyong / Kang, Song et al. | 2021
- 44
-
ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization AlgorithmsCong, Sunli / Hu, Aiyun / Liu, Chen / Jiang, Zheyu et al. | 2021
- 45
-
Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral TechnologyCong, Sunli / Liu, Chen / Zhu, Zhi / Hu, Aiyun et al. | 2021
- 46
-
Robust JPEG Image Steganography Based on SVD and QIM in Stationary Wavelet DomainWang, Zhiguo / Li, Zhiyuan / Song, Xiaofeng / Zhang, Yi et al. | 2021
- 47
-
Raw Material Traceability of Industrial Control System Based on BlockchainXu, Jun / Yang, Zheming / Fang, Hongbo et al. | 2021
- 48
-
Survey: Research on Blockchain Consensus Mechanism in IoT SecurityTang, Xiangyan / Hu, Guangjing / Yuan, Yuming / Li, Hui / Zhang, Yuan / Li, Yifan / Li, Mengyang / Cheng, Jieren et al. | 2021
- 49
-
Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM AlgorithmLi, Xiaojun / Yin, Jincan / Zhang, Xiaogang / Yin, Kangda et al. | 2021
- 50
-
Optimization of Location Technology in Meteorological Wireless Sensor NetworkLi, Haichuan / Zhang, Man / Shi, Xinli / Wang, Yanzhao et al. | 2021
- 51
-
A Survey on the Applications of Wi-Fi SensingLi, Fan / Li, Chao / Lv, Yang / Xu, Haoshan / Wang, Xinhao / Yu, Zhenlei et al. | 2021
- 52
-
Efficient Partially Policy-Hidden CP-ABE for IoT Assisted Smart HealthZhang, Zhishuo / Zhang, Wei / Zhuang, Hanxiang / Sun, Yu / Qin, Zhiguang et al. | 2021
- 53
-
A Novel Hand Gesture Recognition Method for FMCW RadarShui, Yuzhu / Wang, Yong / Li, Zhaoyu / Zhou, Mu et al. | 2021
- 54
-
A Novel Blockchain-Based Revocable Permission Management on CP-ABE SchemeXv, Qianchuan / Song, Yubo / Li, Xuan / Hu, Aiqun / Wang, Junbo et al. | 2021
- 55
-
Automated Authentication of Large-Scale IoT Devices with Hybrid Feature SelectionChen, Qi / Song, Yubo / Hu, Aiqun / Wang, Junbo et al. | 2021
- 56
-
A Practical Blockchain Framework for Securing IoT ApplicationsChen, Jizhou / Cheng, Jieren / Han, Wenbao / Liu, Xianghui et al. | 2021
- 57
-
A Blockchain-Based Internet of Things Forensics ModelLiang, Guangjun / Xin, Jianfang / Wang, Qun / Ni, Xueli / Guo, Xiangmin et al. | 2021
- 58
-
Network Device Identification Based on MAC Boundary InferenceGuo, Xinmiao / Li, Xiangnan / Li, Ruixiang / Wang, Xiuting / Luo, Xiangyang et al. | 2021
- 59
-
Providing Network-Based Datasets and Multi-dimensional Features for IoT Botnet Detection ResearchYin, Jie / Wu, Xianda / Wang, Junnan / Jia, Kun / Liu, Chaoge / Shi, Yue / Cui, Xiang et al. | 2021
- 60
-
The Cross-Domain Identity Authentication Scheme Has no Trusted Authentication Center in the Cloud EnvironmentZhang, Mingming / Mao, Jiaming / Dai, Zaojian / Li, Yong / Zhang, Mingxuan / Fan, Lei / Xu, Liangjie / Hu, Jun / Wang, Anqi et al. | 2021
- 61
-
A Caching Strategy Based on Content Popularity Level for NDNFeng, Min / Li, Ru / Hu, Yong / Yu, Meiju et al. | 2021