default search action
CNCERT 2022: Beijing, China
- Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li:
Cyber Security - 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers. Communications in Computer and Information Science 1699, Springer 2022, ISBN 978-981-19-8284-2
Data Security
- Nishui Cai, Zhuxiang Deng, Hao Wang:
An Intelligent Data Flow Security Strategy Model of Cloud-Network Integration. 3-27 - Qian Chen, Xing Zhang, Ying Wang, Zhijia Zhai, Fen Yang:
Applying a Random Forest Approach to Imbalanced Dataset on Network Monitoring Analysis. 28-37 - Shizhan Lan, Jing Huang:
Brief Analysis for Network Security Issues in Mega-Projects Approved for Data Clusters. 38-50 - Rui Mei, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu, Weiping Wen:
Considerations on Evaluation of Practical Cloud Data Protection. 51-69
Anomaly Detection
- Lirui Deng, Youjian Zhao, Heng Bao:
A Self-supervised Adversarial Learning Approach for Network Intrusion Detection System. 73-85 - Yangyu Long, Wei Zhao, Jilong Yang, Jincheng Deng, Fangming Liu:
Anomaly Detection of E-commerce Econnoisseur Based on User Behavior. 86-98 - Zhangjie Zhao, Lin Zhang, Xing Zhang, Ying Wang, Yi Qin:
CMPD: Context-Based Malicious Parameter Detection for APIs. 99-112 - Xiangyu Fan, Jilong Yang, Wei Zhao, Jincheng Deng, Fangming Liu:
Webpage Tampering Detection Method Based on BiGRU-CRF-RCNN. 113-126
Cryptocurrency
- Ruiguang Li, Jiawei Zhu, Jiaqi Gao, Fudong Wu, Dawei Xu, Liehuang Zhu:
Detecting Bitcoin Nodes by the Cyberspace Search Engines. 129-138 - Shenwen Lin, Hongliang Mao, Zhen Wu, Jinglin Yang:
Research on Bitcoin Anti-anonymity Technology Based on Behavior Vectors Mapping and Aligning Model. 139-147
Information Security
- Heng Bao, Lirui Deng, Jiazhi Guan, Liang Zhang, Xunxun Chen:
Improving Deepfake Video Detection with Comprehensive Self-consistency Learning. 151-161 - Xueqin Yang, Peng Yang, Honggang Lin:
Research on Information Security Asset Value Assessment Methodology. 162-174
Vulnerabilities
- Lin Du, Chuanqi Xu:
Knowledge Graph Construction Research From Multi-source Vulnerability Intelligence. 177-184
Mobile Internet
- Shizhan Lan, Lifang Ma, Jing Huang:
Research and Practice of TCP Protocol Optimization in Mobile Internet. 187-196
Traffic Analysis
- Yanjing Zhang, Jianming Cui, Ming Liu:
Research on Adversarial Patch Attack Defense Method for Traffic Sign Detection. 199-210
Threat Intelligence
- Keke Zhang, Xu Chen, Yongjun Jing, Shuyang Wang, Lijun Tang:
Research on Named Entity Recognition Method of Network Threat Intelligence. 213-224
Text Recognition
- Dawei Xu, Yijie She, Zhonghua Tan, Ruiguang Li, Jian Zhao:
Research on the Recognition of Internet Buzzword Features Based on Transformer. 227-237
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.