Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/csw2:"
@inproceedings{DBLP:conf/csw2/AmeliCFBSM22, author = {Leila Ameli and Md Shah Alam Chowdhury and Farnaz Farid and Abubakar Bello and Fariza Sabrina and Alana Maurushat}, title = {{AI} and Fake News: {A} Conceptual Framework for Fake News Detection}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {34--39}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584722}, doi = {10.1145/3584714.3584722}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/AmeliCFBSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/DuPXL22, author = {Peng Du and Chengwei Peng and Peng Xiang and Qingshan Li}, title = {Anomaly detection of traffic session based on graph neural network}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {1--9}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584715}, doi = {10.1145/3584714.3584715}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/DuPXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/JiYZ22, author = {Miao Ji and Ming Yin and Ying Hui Zhou}, title = {Application of static taint analysis in {RASP} protection strategy}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {40--45}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584723}, doi = {10.1145/3584714.3584723}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/JiYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/Jian22, author = {Yu Jian}, title = {Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids via a Modified Sensor Measurements Expression}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {63--67}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3589127}, doi = {10.1145/3584714.3589127}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/Jian22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/KunKY22, author = {Lan Kun and Ping Kuang and Fan Yang}, title = {Adaptive Change Technology of Encryption Strength Driven by Network Attack Threat}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {52--57}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3589125}, doi = {10.1145/3584714.3589125}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/KunKY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/LiuHWXHZ22, author = {Wei Liu and Hua Xiao Hao and Lan Ai Wan and Kai Xu and Mu Han and Long Xiao Zhu}, title = {A symmetric additive homomorphic encryption scheme based on {NTRU} proxy rekeys}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {25--33}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584720}, doi = {10.1145/3584714.3584720}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/LiuHWXHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/SantiagoM22, author = {Norman Santiago and Janelli Mendez}, title = {Analysis of Common Vulnerabilities and Exposures to Produce Security Trends}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {16--19}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584718}, doi = {10.1145/3584714.3584718}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/SantiagoM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/SunZZ22, author = {Mingwei Sun and Qingwei Zhang and Haiyuan Zhao}, title = {Evaluation and Prediction of Network QoS Based on Multidimensional Data}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {46--51}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584724}, doi = {10.1145/3584714.3584724}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/SunZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/WangFZ22, author = {Ruonan Wang and Jinlong Fei and Rongkai Zhang}, title = {Pruned-F1DCN: {A} lightweight network model for traffic classification}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {20--24}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584719}, doi = {10.1145/3584714.3584719}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/WangFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/WangYZ22, author = {Yuxuan Wang and Haowen Yan and Liming Zhang}, title = {A New Declassification Method for Vector Geographic Data}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {58--62}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3589126}, doi = {10.1145/3584714.3589126}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/WangYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csw2/YaoWXL22, author = {Qian Yao and Yongjie Wang and Xinli Xiong and Yang Li}, title = {Intelligent Penetration Testing in Dynamic Defense Environment}, booktitle = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, pages = {10--15}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714.3584716}, doi = {10.1145/3584714.3584716}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/YaoWXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csw2/2022, title = {Proceedings of the 2022 International Conference on Cyber Security, {CSW} 2022, Hangzhou, China, December 16-18, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584714}, doi = {10.1145/3584714}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csw2/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.