


default search action
CNCERT 2022: Beijing, China
- Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li:

Cyber Security - 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers. Communications in Computer and Information Science 1699, Springer 2022, ISBN 978-981-19-8284-2
Data Security
- Nishui Cai

, Zhuxiang Deng, Hao Wang:
An Intelligent Data Flow Security Strategy Model of Cloud-Network Integration. 3-27 - Qian Chen, Xing Zhang, Ying Wang, Zhijia Zhai, Fen Yang:

Applying a Random Forest Approach to Imbalanced Dataset on Network Monitoring Analysis. 28-37 - Shizhan Lan, Jing Huang:

Brief Analysis for Network Security Issues in Mega-Projects Approved for Data Clusters. 38-50 - Rui Mei

, Han-Bing Yan, Yongqiang He, Qinqin Wang, Shengqiang Zhu, Weiping Wen:
Considerations on Evaluation of Practical Cloud Data Protection. 51-69
Anomaly Detection
- Lirui Deng, Youjian Zhao, Heng Bao:

A Self-supervised Adversarial Learning Approach for Network Intrusion Detection System. 73-85 - Yangyu Long, Wei Zhao, Jilong Yang, Jincheng Deng, Fangming Liu:

Anomaly Detection of E-commerce Econnoisseur Based on User Behavior. 86-98 - Zhangjie Zhao, Lin Zhang, Xing Zhang, Ying Wang, Yi Qin:

CMPD: Context-Based Malicious Parameter Detection for APIs. 99-112 - Xiangyu Fan, Jilong Yang, Wei Zhao, Jincheng Deng, Fangming Liu:

Webpage Tampering Detection Method Based on BiGRU-CRF-RCNN. 113-126
Cryptocurrency
- Ruiguang Li, Jiawei Zhu, Jiaqi Gao, Fudong Wu, Dawei Xu, Liehuang Zhu:

Detecting Bitcoin Nodes by the Cyberspace Search Engines. 129-138 - Shenwen Lin, Hongliang Mao, Zhen Wu, Jinglin Yang:

Research on Bitcoin Anti-anonymity Technology Based on Behavior Vectors Mapping and Aligning Model. 139-147
Information Security
- Heng Bao, Lirui Deng

, Jiazhi Guan, Liang Zhang, Xunxun Chen:
Improving Deepfake Video Detection with Comprehensive Self-consistency Learning. 151-161 - Xueqin Yang, Peng Yang, Honggang Lin:

Research on Information Security Asset Value Assessment Methodology. 162-174
Vulnerabilities
- Lin Du, Chuanqi Xu:

Knowledge Graph Construction Research From Multi-source Vulnerability Intelligence. 177-184
Mobile Internet
- Shizhan Lan, Lifang Ma, Jing Huang:

Research and Practice of TCP Protocol Optimization in Mobile Internet. 187-196
Traffic Analysis
- Yanjing Zhang, Jianming Cui

, Ming Liu:
Research on Adversarial Patch Attack Defense Method for Traffic Sign Detection. 199-210
Threat Intelligence
- Keke Zhang, Xu Chen, Yongjun Jing, Shuyang Wang, Lijun Tang:

Research on Named Entity Recognition Method of Network Threat Intelligence. 213-224
Text Recognition
- Dawei Xu, Yijie She, Zhonghua Tan, Ruiguang Li, Jian Zhao:

Research on the Recognition of Internet Buzzword Features Based on Transformer. 227-237

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














