Catálogo de publicaciones - actas de congreso
2020 the 10th International Conference on Communication and Network Security
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2020 | ACM Digital Library |
Información
Tipo de recurso:
actas de congreso
ISBN impreso
978-1-4503-8903-7
Editor responsable
Association for Computing Machinery (ACM)
País de edición
Estados Unidos
Fecha de publicación
2020-11-27
Información sobre derechos de publicación
Copyright © ACM, Inc.
Cobertura temática
Tabla de contenidos
DIDroid: Android Malware Classification and Characterization Using Deep Image Learning
Abir Rahali; Arash Habibi Lashkari; Gurdip Kaur; Laya Taheri; FRANCOIS GAGNON; Frédéric Massicotte
Pp. No disponible
Slow Scan Attack Detection Based on Communication Behavior
Tomoya Yamashita; Daisuke Miyamoto; Yuji Sekiya; Hiroshi Nakamura
Pp. No disponible
A Privacy-Preserving Framework for Surveillance Systems
Kok-Seng Wong; Nguyen Anh Tu; Anuar Maratkhan; M.Fatih Demirci
Pp. No disponible
Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations
Florian Adamsky; Daniel Kaiser; Michael Steglich; Thomas Engel
Pp. No disponible
Analysis on Entropy Sources based on Smartphone Sensors
Na Lv; Tianyu Chen; Yuan Ma
Pp. No disponible
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain
Ming Yang; Xuexian Hu; Jianghog Wei; Qihui Zhang; Wenfen Liu
Pp. No disponible
VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory
Xuefei Wang; Rui Ma; Donghai Tian; Xiajing Wang
Pp. No disponible
TLS Encrypted Application Classification Using Machine Learning with Flow Feature Engineering
Onur Barut; Rebecca Zhu; Yan Luo; Tong Zhang
Pp. No disponible
On the predictability of biometric honey templates, based on Bayesian inference
Edlira Martiri; Bian Yang
Pp. No disponible
Identification of Spoofed Emails by applying Email Forensics and Memory Forensics
Sanjeev Shukla; Manoj Misra; Gaurav Varshney
Pp. No disponible