Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers (Unbekannt)
- Neue Suche nach: Lu, Wei
- Neue Suche nach: Lu, Wei
- Neue Suche nach: Lang, Bo
- Neue Suche nach: Li, Chao
- Neue Suche nach: Yan, Hanbing
- Neue Suche nach: Ding, Li
- Neue Suche nach: Wen, Qiaoyan
- Neue Suche nach: Li, Ruiguang
- Neue Suche nach: Lu, Wei
- Neue Suche nach: Wen, Weiping
- Neue Suche nach: Zhou, Yu
- Neue Suche nach: Zhang, Yuqing
2020
-
ISBN:
- Report / Elektronische Ressource
-
Titel:Cyber Security : 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers
-
Beteiligte:Lu, Wei ( Autor:in ) / Lang, Bo / Li, Chao / Yan, Hanbing / Ding, Li / Wen, Qiaoyan / Li, Ruiguang / Lu, Wei / Wen, Weiping / Zhou, Yu
-
Verlag:
- Neue Suche nach: Springer Nature
-
Erscheinungsdatum:2020
-
Format / Umfang:1 electronic resource (235 pages)
-
ISBN:
-
Medientyp:Report
-
Format:Elektronische Ressource
-
Sprache:Unbekannt
-
Reportnr. / Förderkennzeichen:10.1007/978-981-33-4922-3
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural NetworkRui, Zhiqing / Wu, Jingzheng / Shao, Yanjie / Luo, Tianyue / Yang, Mutian / Wu, Yanjun / Wu, Bin et al. | 2021
- 2
-
Research on the Development Route of International Communication AccessesYang, Tianpu / Gao, Junshi / Chen, Xiaoming / Guo, Yanchun / Sun, Shuo et al. | 2021
- 3
-
A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud ComputingZhang, Jiuling / Shen, Shijun / Huang, Daochao et al. | 2021
- 4
-
Based on GAN Generating Chaotic SequenceChen, Xuguang / Ma, Hongbin / Ji, Pujun / Liu, Haiting / Liu, Yan et al. | 2021
- 5
-
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining AttacksYu, Guorui / Yang, Guangliang / Li, Tongxin / Han, Xinhui / Guan, Shijie / Zhang, Jialong / Gu, Guofei et al. | 2021
- 6
-
Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an ExampleHuang, Haibo / Gao, Yuxi / Yan, Min / Zhang, Xiaofan et al. | 2021
- 7
-
Research Status and Prospect of Blockchain Technology in Agriculture FieldXu, Dawei / Wang, Weiqi / Zhu, Liehuang / Li, Ruiguang et al. | 2021
- 8
-
Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based NetworkRao, Yu / Liu, Weixin / Zhu, Tian / Yan, Hanbin / Zhou, Hao / Bai, Jinghua et al. | 2021
- 9
-
Research on the Remote Deployment Design of OTN Electrical RacksYang, Tianpu / Gao, Junshi / Wang, Haitao / Dai, Guangchong / Zhai, Rui et al. | 2021
- 10
-
An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature AugmentationGu, Jie et al. | 2021
- 11
-
DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep LearningYu, Yuqi / Yan, Hanbing / Ma, Yuan / Zhou, Hao / Guan, Hongchao et al. | 2021
- 12
-
A Label Propagation Based User Locations Prediction Algorithm in Social NetworkMa, Huan / Wang, Wei et al. | 2021
- 13
-
Perosonalized Differentially Private Location Collection Method with Adaptive GPS DiscretizationLiu, Huichuan / Zeng, Yong / Liu, Jiale / Liu, Zhihong / Ma, Jianfeng / Zhu, Xiaoyan et al. | 2021
- 14
-
Analysis on the Security of Satellite InternetCao, Huan / Wu, Lili / Chen, Yue / Su, Yongtao / Lei, Zhengchao / Zhao, Chunping et al. | 2021
- 15
-
A Survey on Cyberspace Search EnginesLi, Ruiguang / Shen, Meng / Yu, Hao / Li, Chao / Duan, Pengyu / Zhu, Lihuang et al. | 2021
- 16
-
Brief Introduction of Network Security Asset Management for BanksWang, Yumo / Zhang, Qinghua et al. | 2021
- 17
-
Embedded Security-Critical Device Resource IsolationWang, Xuguo / Kan, Shengzhe / Xu, Yeli et al. | 2021