TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step Classifiers (English)
- New search for: Wang, Zhengqi
- New search for: Feng, Xiaobing
- New search for: Niu, Yukun
- New search for: Zhang, Chi
- New search for: Su, Jue
- New search for: Wang, Zhengqi
- New search for: Feng, Xiaobing
- New search for: Niu, Yukun
- New search for: Zhang, Chi
- New search for: Su, Jue
In:
2017 International Conference on Networking and Network Applications (NaNA)
;
170-175
;
2017
-
ISBN:
- Conference paper / Electronic Resource
-
Title:TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step Classifiers
-
Contributors:Wang, Zhengqi ( author ) / Feng, Xiaobing ( author ) / Niu, Yukun ( author ) / Zhang, Chi ( author ) / Su, Jue ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2017-10-01
-
Size:437277 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Efficient (k, n) Secret Sharing Scheme Secure against k — 2 CheatersZhu, Lei / Liu, Yanxiao / Wang, Yichuan / Ji, Wenjiang / Hei, Xinhong / Yao, Quanzhu / Zhu, Xiaoyan et al. | 2017
- 5
-
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc NetworksLi, Teng / Ma, Jianfeng / Sun, Cong / Wei, Dawei / Xi, Ning et al. | 2017
- 11
-
PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid SliceZhang, Yinghui / Zheng, Dong / Zhao, Qinglan / Lai, Chengzhe / Ren, Fang et al. | 2017
- 17
-
A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social NetworksSong, Haokai / Pei, QingQi / Xiao, Yang / Li, Zi / Wang, Yong et al. | 2017
- 24
-
Preserving Friendly-Correlations in Uncertain Graphs Using Differential PrivacyHu, Jing / Shi, Wuchao / Liu, Hai / Yan, Jun / Tian, Yuan / Wu, Zhenqiang et al. | 2017
- 30
-
Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise SourcesDang, Yongchao / Chen, Yin / Wu, Huihui / Shen, Yulong / Jiang, Xiaohong et al. | 2017
- 36
-
Efficient ONU Migration for Fixed and Mobile Convergence Network in High-Speed Rail AreaGu, Rentao / Zhang, Shizong / Yan, Zidi / Ji, Yuefeng et al. | 2017
- 42
-
Limits of Covert Communication on Two-Hop AWGN ChannelsWu, Huihui / Liao, Xuening / Dang, Yongchao / Shen, Yulong / Jiang, Xiaohong et al. | 2017
- 48
-
Secure Transmission with Limited Feedback in MISOME Wiretap ChannelsQuan, Jiao / Li, Xiaochen / Xiao, Yeqiu / Shen, Yulong / Li, Fenghua et al. | 2017
- 54
-
An Improved Amorphous Algorithm in Wireless Sensor Network Based on Approximate Equilateral Triangle Beacon SelectionShen, Shikai / Qian, Kaiguo / Yang, Bin / She, Yumei / Wang, Wu / Wang, Yujian et al. | 2017
- 61
-
A Novel Personalized Differential Privacy Mechanism for Trajectory Data PublicationTian, Feng / Zhang, Shuangyue / Lu, Laifeng / Liu, Hai / Gui, Xiaolin et al. | 2017
- 69
-
BF-PDT: A New Name Lookup Mechanism in Content-Centric NetworkingHao, Hao / Xu, Changqiao / Yang, Shujie / Guan, Jianfeng / Liu, Yang / Zhong, Lujie et al. | 2017
- 75
-
A Novel Scheme for Phase Noise Compensation in CO-OFDM Long-Reach Passive Optical NetworksZeglam, Mohamed Ben / Ho, Pin Han / Peng, Limei / Jie, Shuiping et al. | 2017
- 80
-
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc NetworksLiu, Jia / Xu, Yang / Ando, Ruo / Takakura, Hiroki / Xu, Yifei et al. | 2017
- 87
-
End-to-End Congestion Relief Routing Protocol for Ad Hoc NetworksXu, Yang / Liu, Jia / Ando, Ruo / Shiratori, Norio et al. | 2017
- 93
-
Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc NetworksLi, Yanping / Qi, Yanjiao / Lu, Laifeng et al. | 2017
- 100
-
Multicast Delivery Delay in General Two-Hop Relay MANETsYang, Bin / Wu, Zhenqiang / Shen, Yulong / Fan, Yuanyuan et al. | 2017
- 104
-
An Empirical Study of Unsolicited Content Injection into a WebsiteJianming, Fu / Mengfei, Xie / Yingjun, Wang / Xufen, Mei et al. | 2017
- 112
-
Hierarchical CSI-fingerprints Classification for Passive Multi-person LocalizationMa, Runcong / Yu, Gwo-Jong / Chen, Guilin / Zhao, Shenghui / Yang, Bin et al. | 2017
- 118
-
A Flexible Frame-Oriented Host-FPGA Communication Framework for Software Defined Wireless Networkliu, Jun / Li, Zhiwei / Ding, Boyan / Wu, Haoyang / Wang, Tao et al. | 2017
- 125
-
Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated SequencesLiu, Hai / Wu, Zhenqiang / Peng, Changgen / Lei, Xiujuan et al. | 2017
- 133
-
Spectral Efficiency, Diversity Gain and Multiplexing Capacity Analysis for Massive MIMO, 5G Communications SystemPoudel, Khem Narayan / Gangaju, Shankar et al. | 2017
- 138
-
Development of a Hybrid FSO/RF System during Link MisalignmentKiran, Kappala Vinod / Rathore, Shikha / Turuk, Ashok Kumar / Das, Santos Kumar et al. | 2017
- 141
-
Application Oriented Sensor Database SystemSatyanarayana, G. S. R. / Chakraborty, Debarka / Das, Santos Kumar et al. | 2017
- 147
-
A Privacy Measurement Method Using Network Structure EntropyShi, Wuchao / Hu, Jing / Yan, Jun / Wu, Zhenqiang / Lu, Laifeng et al. | 2017
- 152
-
Reliability Analysis of Molecular Communication Based on Drift DiffusionWang, Xinlei / Wu, Zhenqiang / Chen, Jiawang / Hao, Xuanwen / Liu, Bo et al. | 2017
- 158
-
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon DivergenceQiao, Shuangyuan / Zeng, Yong / Zhou, Lingjie / Liu, Zhihong / Ma, Jianfeng et al. | 2017
- 164
-
Delay and Capacity in Three-Dimensional Mobile Ad Hoc Networks with Packet ReplicationWang, Wu / Yang, Bin / Shen, Shikai / Wang, Yujian / Fang, Gang et al. | 2017
- 170
-
TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step ClassifiersWang, Zhengqi / Feng, Xiaobing / Niu, Yukun / Zhang, Chi / Su, Jue et al. | 2017
- 176
-
An Enhanced Soft Combination Algorithm Based on CUSUM for Cooperative Spectrum SensingMiao, Jingcheng / Song, Xiao Ou et al. | 2017
- 180
-
LTE Network: Coverage and Capacity Planning — 4G Cellular Network Planning around BanepaJha, Sujeet Kumar / Rokaya, Rupa / Bhagat, Amit / Khan, Ahmed Raja / Aryal, Laxman et al. | 2017
- 186
-
Wireless Monitoring of Photovoltaics PanelsSah, Rahul Kumar / Ghising, Sushant / Dulal, Saurab / Karn, Manish / Sah, Suresh et al. | 2017
- 190
-
Uncertain Graph Method Based on Triadic Closure Improving Privacy Preserving in Social NetworkYan, Jun / Zhang, Lin / Shi, Wuchao / Hu, Jing / Wu, Zhenqiang et al. | 2017
- 196
-
An 802.11 MAC Optimization Mechanism Based on Throughput Proportional Fairness in Multi-rate WLANYan, Mu / Wang, Yatong / Wu, Su / Feng, Gang / Qin, Shuang et al. | 2017
- 203
-
MSIPS: Multi-tiered Security IPs Architecture for Secure SoC DesignHuang, Zhao / Wang, Quan et al. | 2017
- 209
-
A Security Routing Protocol for Internet of Things Based on RPLMa, Guojun / Li, Xing / Pei, Qingqi / Li, Zi et al. | 2017
- 214
-
A Transmission Mechanism of the Backup for Disaster Recovery in DCNsShi, Zhan / Wang, Chenyue / Wen, Qili / Su, Wei / Zhou, Huachun / Gao, Shuai et al. | 2017
- 220
-
Backup Path Provisioning for Service Protection against Disaster Failures in Telecom NetworksDu, Xiaowu / Ma, Lisheng et al. | 2017
- 225
-
2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster RescueJi, Xiang / Hua, Qingyi / Li, Chunyu / Tang, Junsong / Wang, Anwen / Chen, Xiaojiang / Fang, Dingyi et al. | 2017
- 232
-
Reputation Propagation for Web Service Composition: A Shapley Value ApproachZhang, Tao / Wang, Yongzhi / Li, Guangxia / Guo, Jingjing / Li, Qi et al. | 2017
- 239
-
A CCA-secure Verifiable Mix-NetLi, Long-Hai / Huang, Cheng-Qiang / Fu, Shao-Feng et al. | 2017
- 246
-
Performance Evaluation and Optimization for Android-Based Web ServerZhao, Yajing / Wang, Jing / Zhang, Lei / Wang, Jingyu / Qi, Qi et al. | 2017
- 252
-
Joint Resource Scheduling for Mobile Multimedia Services in Hierarchical Cloud NetworksLiu, Mengjie / Wang, Yatong / Zhou, Jiang / Feng, Gang / Qin, Shuang et al. | 2017
- 258
-
GA-based Load Balancing Algorithm for Distributed Timing TaskGuo, Yiming / Wang, Yulong / Zhang, Lei / Wang, Jingyu / Qi, Qi et al. | 2017
- 263
-
The Storage of Virtual Machine Disk Image in Cloud Computing: A SurveyZhao, Yuyan / Chen, Haibao / Zhao, Shenghui / Wang, Yihong et al. | 2017
- 268
-
A Novel Approach for Mining Road Information from Low Precision GPS DataZhang, Siqie / Li, Changle / Zhou, Xun et al. | 2017
- 274
-
GT-SGD: A Novel Gradient Synchronization Algorithm in Training Distributed Recurrent Neural Network Language ModelsZhang, Xiaoci / Gu, Naijie / Yasrab, Robail / Ye, Hong et al. | 2017
- 279
-
A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr SignatureZhai, You / Xu, Guangquan / Zhang, Yao et al. | 2017
- 286
-
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple CloudsXi, Ning / Sun, Cong / Lu, Di / Shen, Yulong et al. | 2017
- 292
-
D2D Communication for Disaster Recovery in Cellular NetworksGao, Hui / Shen, Yulong / Yang, Bin et al. | 2017
- 296
-
Big Data Application for Nepalese Government: A Proposed Solution for Labor MigrantPradhan, Pratima / Shakya, Subarna et al. | 2017
- 303
-
CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGXWang, Yongzhi / Liu, Lingtong / Su, Cuicui / Ma, Jiawen / Wang, Lei / Yang, Yibo / Shen, Yulong / Li, Guangxia / Zhang, Tao / Dong, Xuewen et al. | 2017
- 309
-
Trust-Aware Data Uploading Based on Device-to-Device CommunicationsLiu, Xiaolan / Yang, Bin / Jiang, Xiaohong et al. | 2017
- 314
-
Techno-Economic Evaluation of CDN Deployments in Metropolitan Area NetworksAyoub, Omran / Musumeci, Francesco / Tornatore, Massimo / Pattavina, Achille et al. | 2017
- 320
-
A Survey of Multipath Transport Mechanism in Software Defined NetworkGao, Kai / Xu, Changqiao / Guan, Jianfeng / Liu, Yang et al. | 2017
- 326
-
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical FrameworkSalem, Ahmed / Liao, Xuening / Shen, Yulong / Lu, Xiang et al. | 2017
- 330
-
Cost Effective Accommodation Planning in a Trip by Using Accommodation Advisor Query (AA-Query) in STPFGautam, Bishnu Prasad / Batajoo, Amit / Asami, Hiroyasu et al. | 2017
- 337
-
A Survey on Big Data in Financial SectorJaiswal, Anku / Bagale, Purrushottam et al. | 2017
- 341
-
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud ComputingHan, Ziyi / Yang, Li / Liu, Qiang et al. | 2017
- 347
-
Research on Power Allocation of Network Coding in Vehicle NetworkingHu, Jingjing / Ji, Yancheng / Li, Junma / Dong, Danfeng et al. | 2017
- 353
-
Author index| 2017
- 356
-
[Publisher's information]| 2017
- c1
-
[Front cover]| 2017
- i
-
[Title page I]| 2017
- iii
-
[Title page iii]| 2017
- iv
-
[Copyright notice]| 2017
- v
-
Table of contents| 2017
- xi
-
Message from General Conference Chairs| 2017
- xii
-
Conference Organization| 2017
- xiv
-
Keynotes| 2017