default search action
CNCERT 2018: Beijing, China
- Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou:
Cyber Security - 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 970, Springer 2019, ISBN 978-981-13-6620-8
Identity Authentication
- Yexia Cheng, Yuejin Du, Jin Peng, Jun Fu, Baoxu Liu:
Research on Identity Authentication Method Based on Negative Logic System. 3-15 - Baoxian Guo, Ying Xu, Renjie Li, Xingxiong Zhu:
Design of Multi-dimensional Electronic Channel Unified Identity Authentication Method for Power Information System. 16-23
Mobile Security
- Xiaobo Zhu, Yunqian Zhu:
Extension of ISO/IEC27001 to Mobile Devices Security Management. 27-35 - Jingwei Li, Bozhi Wu, Weiping Wen:
Android Malware Detection Method Based on Frequent Pattern and Weighted Naive Bayes. 36-51
Emerging Technologies
- Hai Wang, Yong Wang, Zigang Cao, Zhen Li, Gang Xiong:
An Overview of Blockchain Security Analysis. 55-72 - Zhuohang Lv, Han-Bing Yan, Rui Mei:
Automatic and Accurate Detection of Webshell Based on Convolutional Neural Network. 73-85 - Songer Sun, Li Zhang, Xiaoping Han, Chengjie Gu:
End-Link Collaboration Control Mechanism in Intelligent Networks Based on Traffic Classification. 86-95 - Huan Zhou:
Malware Detection with Neural Network Using Combined Features. 96-106
Cyber Threat Detection and Defense
- Xueqiang Zou, Peng Zhang, Caiyun Huang, Xiu-guo Bao:
Malicious Websites Identification Based on Active-Passive Method. 109-121 - Yue Li, Teng Zhang, Xue Li, Ting Li:
A Model of APT Attack Defense Based on Cyber Threat Detection. 122-135 - Zhonghao Sun, Zhejun Fang, Yueying He, Jianqiang Li:
A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Tests. 136-144 - Yashu Liu, Zhihai Wang, Shu Tian:
Security Against Network Attacks on Web Application System. 145-152 - Mianmian Shi, Huaping Cao:
Association Visualization Analysis for the Application Service Layer and Network Control Layer. 153-164 - Yexia Cheng, Yuejin Du, Jin Peng, Jun Fu, Baoxu Liu:
Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation. 165-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.