Catálogo de publicaciones - actas de congreso

Compartir en
redes sociales


2020 the 10th International Conference on Communication and Network Security

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2020 ACM Digital Library

Información

Tipo de recurso:

actas de congreso

ISBN impreso

978-1-4503-8903-7

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Información sobre derechos de publicación

Copyright © ACM, Inc.

Tabla de contenidos

DIDroid: Android Malware Classification and Characterization Using Deep Image Learning

Abir Rahali; Arash Habibi Lashkari; Gurdip Kaur; Laya Taheri; FRANCOIS GAGNON; Frédéric Massicotte

Pp. No disponible

Slow Scan Attack Detection Based on Communication Behavior

Tomoya Yamashita; Daisuke Miyamoto; Yuji Sekiya; Hiroshi Nakamura

Pp. No disponible

A Privacy-Preserving Framework for Surveillance Systems

Kok-Seng Wong; Nguyen Anh Tu; Anuar Maratkhan; M.Fatih Demirci

Pp. No disponible

Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations

Florian Adamsky; Daniel Kaiser; Michael Steglich; Thomas Engel

Pp. No disponible

Analysis on Entropy Sources based on Smartphone Sensors

Na Lv; Tianyu Chen; Yuan Ma

Pp. No disponible

Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain

Ming Yang; Xuexian Hu; Jianghog Wei; Qihui Zhang; Wenfen Liu

Pp. No disponible

VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory

Xuefei Wang; Rui Ma; Donghai Tian; Xiajing Wang

Pp. No disponible

TLS Encrypted Application Classification Using Machine Learning with Flow Feature Engineering

Onur Barut; Rebecca Zhu; Yan Luo; Tong Zhang

Pp. No disponible

On the predictability of biometric honey templates, based on Bayesian inference

Edlira Martiri; Bian Yang

Pp. No disponible

Identification of Spoofed Emails by applying Email Forensics and Memory Forensics

Sanjeev Shukla; Manoj Misra; Gaurav Varshney

Pp. No disponible