Stop the war!
Остановите войну!
for scientists:
default search action
9th ICCNS 2019: Chongqing, China
- ICCNS 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019. ACM 2019, ISBN 978-1-4503-7662-4
- Zufa Zhang, Jianqiang Dai, Lingling Zhao, Songling Qin:
A Web Services Testing Approach based on Difference Measurement and Adaptive Random Testing. 1-5 - Jianing Zhang, Xingtao Zhuang, Yunfang Chen:
Android Malware Detection Combined with Static and Dynamic Analysis. 6-10 - Ping Yang, Hui Shu, Xiaobing Xiong, Fei Kang:
Semantic-based Malware Behavior Description: Past and Future. 11-19 - Bo Liu, Honghe Ge, Jinfu Chen, Qihao Bao:
An Automatic Testing Platform for Object-oriented Software based on Code Coverage. 20-24 - Kaige Yang, Shenghui Su:
Secure Email Login Based on Lightweight Asymmetric Identities. 25-29 - Chen Yang, Wei Yan:
Location Privacy Protection Scheme Based on Location Services. 30-33 - Qingqing Chang, Shenghui Su:
Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping. 34-39 - Rui Dai, Chuan Gao, Bo Lang, Lixia Yang, Hongyu Liu, Shaojie Chen:
SSL Malicious Traffic Detection Based On Multi-view Features. 40-46 - Bin Kong, Zhangpu Liu, Guangming Zhou, Xiaoyan Yu:
A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics. 47-50 - Han Li, Chonglin Gu, Yi Chen, Wenye Li:
An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with Blockchain. 51-57 - Wu-Chuan Yang, Lien-Yuan Ting:
Embedded Authentication and Blockchain in Micro-course. 58-62 - Zijie Lin, Liangliang Gao, Xuexian Hu, Yuxuan Zhang, Wenfen Liu:
Differentially Private Graph Clustering Algorithm Based on Structure Similarity. 63-68 - Huajun Liu, Zhanghui Liu, Yanhua Liu, Xiaoling Gao:
Abnormal Network Traffic Detection based on Leaf Node Density Ratio. 69-74 - Yanyan Chen, Wenxian Han:
Research on Automatically Switched Optical Network Security Based on Quantum Key Distribution. 75-78 - Xiaoling Gao, Yanhua Liu, Yanbin Qiu, Huajun Liu:
A Comprehensive Assessment Method of Asset Importance for Key Asset Protection. 79-83 - Yingying Qi, Wenli Shang, Xiaojun He:
A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series. 84-91 - Enjian Bai, Fangyuan Qin, Sijing Chen:
Effective Scrambling Scheme for Physical Layer Security. 92-96 - Biqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao:
Attack Intent Analysis Method Based on Attack Path Graph. 97-102 - Yu Kun:
Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL. 103-108 - Xuerong Yue, Jiji Gao, Zhibin Chen:
A Polynomial Time Algorithm for Scheduling on Processing Time Constraints. 109-113 - Xinli Xiong, Linru Ma, Chao Cui:
Simulation Environment of Evaluation and Optimization for Moving Target Defense: A SimPy Approach. 114-117 - Jiaxin Liu, Xuerong Yue, Zhibin Chen:
A Note on Polynomial-time Solvability for Edge Packing on Graphs. 118-122 - Fanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou:
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. 123-127 - Hua Jiang, Jinpo Fan, Gang Zhang, Ronglei Hu:
Design and Implementation of Integrated Access VPN Gateway. 128-132 - Yucheng Wang, Daohua Zhu, Qing Wu, Yajuan Guo, Chonghai Yang, Wenjiang Feng:
Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network. 133-136 - Xin Song, Xue Huang, Haijun Qian:
Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks. 137-141 - Wen Yang, Meijuan Yin, Xiaonan Liu, Can Wang, Shunran Duan:
Multi-source Landmark Fusion based on Machine Learning. 142-148 - Qipeng He, Cong Dai, Rong Si, Jianwen Lin:
Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop. 149-153 - Phan The Duy, Le Duy An, Van-Hau Pham:
Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN. 154-158 - Kaihang Zhou, Lei Shi, Jiahua Wei, Yang Xue, Jie Tang:
Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States. 159-163
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.