Stop the war!
Остановите войну!
for scientists:
default search action
1st SSIC 2015: Shanghai, China
- International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, Shanghai, China, August 5-7, 2015. IEEE 2015, ISBN 978-1-4673-7977-9
- Yue Wu, Fanchao Meng, Guanghao Wang, Ping Yi:
A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks. 1-7 - Zongshuai Hu, Yong Wang, Chunhua Gu, Dejun Mengm, Xiaoli Yang, Shuai Chen:
Malicious data identification in smart grid based on residual error method. 1-5 - Paul Wang, Amjad Ali, William Kelly:
Data security and threat modeling for smart city infrastructure. 1-6 - Huangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen:
Classified security protection evaluation for vehicle information system. 1-6 - Dhavy Gantsou:
On the use of security analytics for attack detection in vehicular ad hoc networks. 1-6 - Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Xiuzhen Chen:
Bayesian-based model for a reputation system in vehicular networks. 1-6 - Mounira Msahli, Mohamed Tahar Hammi, Ahmed Serhrouchni:
Safe box cloud authentication using TLS extesion. 1-6 - Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni:
Survey on packet marking fields and information for IP traceback. 1-8 - Tubagus Mohammad Akhriza, Yinghua Ma, Jianhua Li:
A novel Fibonacci windows model for finding emerging patterns over online data stream. 1-8 - Li-Xiong Zheng, Xiao-Lin Xu, Jia Li, Lu Zhang, Xuan-Chen Pan, Zhi-Yuan Ma, Li-Hong Zhang:
Malicious URL prediction based on community detection. 1-7 - Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel:
Analysis of cyber security for industrial control systems. 1-8 - Yanan Wang, Xiuzhen Chen, Jianhua Li:
A new genetic-based rumor diffusion model for social networks. 1-5 - Xiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou:
Overview of cyber-security of industrial control system. 1-7 - Rida Khatoun, P. Gut, R. Doulami, Lyes Khoukhi, Ahmed Serhrouchni:
A reputation system for detection of black hole attack in vehicular networking. 1-5 - Andreas Brauchli, Depeng Li:
A solution based analysis of attack vectors on smart home systems. 1-6 - Heng Chuan Tan, Jun Zhang, Maode Ma, Peter Han Joo Chong, Houda Labiod:
Secure Public Key Regime (SPKR) in vehicular networks. 1-7 - Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti:
Flooding attacks detection in MANETs. 1-6 - Xiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue:
Security in MIMO wireless hybrid channel with artificial noise. 1-4 - Lina Zhu, Zuochang Zhan:
A random key management scheme for heterogeneous wireless sensor network. 1-5 - Fouad Amine Guenane, Ahmed Serhrouchni:
Secure access & authentication for collaborative intercloud exchange service. 1-5 - Prateek Singh, Saurabh Garg, Vinod Kumar, Zia Saquib:
A testbed for SCADA cyber security and intrusion detection. 1-6 - Gérard Memmi, Katarzyna Kapusta, Han Qiu:
Data protection: Combining fragmentation, encryption, and dispersion. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.