Search dblp for Publications

export results for "stream:streams/conf/csw2:"

 download as .bib file

@inproceedings{DBLP:conf/csw2/AmeliCFBSM22,
  author       = {Leila Ameli and
                  Md Shah Alam Chowdhury and
                  Farnaz Farid and
                  Abubakar Bello and
                  Fariza Sabrina and
                  Alana Maurushat},
  title        = {{AI} and Fake News: {A} Conceptual Framework for Fake News Detection},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {34--39},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584722},
  doi          = {10.1145/3584714.3584722},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/AmeliCFBSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/DuPXL22,
  author       = {Peng Du and
                  Chengwei Peng and
                  Peng Xiang and
                  Qingshan Li},
  title        = {Anomaly detection of traffic session based on graph neural network},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584715},
  doi          = {10.1145/3584714.3584715},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/DuPXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/JiYZ22,
  author       = {Miao Ji and
                  Ming Yin and
                  Ying Hui Zhou},
  title        = {Application of static taint analysis in {RASP} protection strategy},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584723},
  doi          = {10.1145/3584714.3584723},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/JiYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/Jian22,
  author       = {Yu Jian},
  title        = {Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks
                  in Power Grids via a Modified Sensor Measurements Expression},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {63--67},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3589127},
  doi          = {10.1145/3584714.3589127},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/Jian22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/KunKY22,
  author       = {Lan Kun and
                  Ping Kuang and
                  Fan Yang},
  title        = {Adaptive Change Technology of Encryption Strength Driven by Network
                  Attack Threat},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {52--57},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3589125},
  doi          = {10.1145/3584714.3589125},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/KunKY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/LiuHWXHZ22,
  author       = {Wei Liu and
                  Hua Xiao Hao and
                  Lan Ai Wan and
                  Kai Xu and
                  Mu Han and
                  Long Xiao Zhu},
  title        = {A symmetric additive homomorphic encryption scheme based on {NTRU}
                  proxy rekeys},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {25--33},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584720},
  doi          = {10.1145/3584714.3584720},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/LiuHWXHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/SantiagoM22,
  author       = {Norman Santiago and
                  Janelli Mendez},
  title        = {Analysis of Common Vulnerabilities and Exposures to Produce Security
                  Trends},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {16--19},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584718},
  doi          = {10.1145/3584714.3584718},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/SantiagoM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/SunZZ22,
  author       = {Mingwei Sun and
                  Qingwei Zhang and
                  Haiyuan Zhao},
  title        = {Evaluation and Prediction of Network QoS Based on Multidimensional
                  Data},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584724},
  doi          = {10.1145/3584714.3584724},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/SunZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/WangFZ22,
  author       = {Ruonan Wang and
                  Jinlong Fei and
                  Rongkai Zhang},
  title        = {Pruned-F1DCN: {A} lightweight network model for traffic classification},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {20--24},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584719},
  doi          = {10.1145/3584714.3584719},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/WangFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/WangYZ22,
  author       = {Yuxuan Wang and
                  Haowen Yan and
                  Liming Zhang},
  title        = {A New Declassification Method for Vector Geographic Data},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {58--62},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3589126},
  doi          = {10.1145/3584714.3589126},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/WangYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csw2/YaoWXL22,
  author       = {Qian Yao and
                  Yongjie Wang and
                  Xinli Xiong and
                  Yang Li},
  title        = {Intelligent Penetration Testing in Dynamic Defense Environment},
  booktitle    = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  pages        = {10--15},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714.3584716},
  doi          = {10.1145/3584714.3584716},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/YaoWXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csw2/2022,
  title        = {Proceedings of the 2022 International Conference on Cyber Security,
                  {CSW} 2022, Hangzhou, China, December 16-18, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584714},
  doi          = {10.1145/3584714},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csw2/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics