|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 68 publication records. Showing 68 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yunlong Hu, Ping Yi, Yu Sui, Zongrui Zhang, Yao Yao 0009, Wei Wang 0190, Ting Zhu 0001 |
Dispatching and Distributing Energy in Energy Internet under Energy Dilemma. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Philippe Monteuuis, Jonathan Petit, Jun Zhang 0019, Houda Labiod, Stefano Mafrica, Alain Servel |
"My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zhutian Feng, Cunqing Hua |
Machine Learning-based RF Jamming Detection in Wireless Networks. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Danhua Huang, Li Pan |
An Improved Group-based Influence Maximization Method in Social Networks. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Liang Hui, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Hongyuan Chen, Yunong Liang |
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Wei Shiu, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji |
Data Hiding for Color Image by Rubik's Cube. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Junhua Tang, Shuli Zhao, Yue Wu 0010, Jianhua Li 0001 |
Caching Strategy for Scalable Video Coding in Information-Centric Networking. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen, Sheng Yan, Tianyu Pang, Rui Chen |
Detection of DGA Domains Based on Support Vector Machine. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Achraf Fayad, Badis Hammi, Rida Khatoun |
An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lei Sun, Shuai Li, Songhui Guo, Yingxin Xu |
Performance Modeling towards Interrupt System of Virtualized Cryptography Device. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Han Qiu 0001, Nathalie Enfrin, Gérard Memmi |
A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Gaobo Sun, Shuyu Li, Zhanchun Kang |
Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yishuang Meng, Ping Yi, Xuejun Guo, Wen Gu, Xin Liu, Wei Wang 0190, Ting Zhu 0001 |
Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning Framework. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yuxuan Luo, Shaoyin Cheng, Chong Liu, Fan Jiang |
PU Learning in Payload-based Web Anomaly Detection. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yaobin Xie, Wei Wang, Faren Wang, Rui Chang |
VTET: A Virtual Industrial Control System Testbed for Cyber Security Research. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Peng Zhang, Shaoyin Cheng, Songhao Lou, Fan Jiang 0005 |
A Novel Android Malware Detection Approach Using Operand Sequences. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen |
SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Caleb Riggs, Tanner Douglas, Kanwalinderjit Gagneja |
Image Mapping through Metadata. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jianguo Zheng, Li Pan |
Least Cost Rumor Community Blocking optimization in Social Networks. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Qingyuan Li, Hao Wu 0005, Lei Liu, Bin Pan, Lan Dong |
A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | |
Third International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018, Shanghai, China, October 18-19, 2018 |
SSIC |
2018 |
DBLP BibTeX RDF |
|
1 | Chenbin Wu, Yunjie Zhou, Xiaojuan Jiang, Yinbai Xu, Xiaodi Wang, He He 0002 |
Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power Cables. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Boren He, Futai Zou, Yue Wu 0010 |
Multi-SDN Based Cooperation Scheme for DDoS Attack Defense. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Huijie Lian, Guangbo Wang, Qingxian Wang |
Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hong-Beom Choi, Young-Bae Ko, Keun-Woo Lim |
Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Zhihong Zhou, Lihong Yao, Jianhua Li, Bin Hu, Chen Wang, Zhenglong Wang |
Classification of botnet families based on features self-learning under Network Traffic Censorship. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoliang Wang, Junhua Tang, Mengdi Yu, Gubei Yin, Jianhua Li 0001 |
A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Mengyi Chen, Li Pan |
Least Cost Precision Marketing Based on User Profiles in Social Networks. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xuelei Wang, Ernest Foo |
Assessing Industrial Control System Attack Datasets for Intrusion Detection. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Adja Elloh Yves-Christian, Badis Hammi, Ahmed Serhrouchni, Houda Labiod |
Total Eclipse: How To Completely Isolate a Bitcoin Peer. |
SSIC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Junhua Tang, Shujun Lin, Cunqing Hua, Yue Wu 0010, Jianhua Li 0001 |
Channel aware resource allocation for device-to-device communication underlaying cellular networks. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vasileios Gkioulos, Stephen D. Wolthusen |
Securing tactical service oriented architectures. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yongkai Zhou, Hang Yuan, Lijun Zu, Guobao Liu, Ge Li |
Multiple SDN controller orchestration for financial cloud. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peng Chen, Weini Zeng, Yong Zhu, Yingyan Gu |
Secure range query based on privacy-preserving function in two-tiered sensor networks. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jun Zhang 0019, Houda Labiod, Mengying Ren, Hengchuan Tan |
Cooperation behavior of vehicles in an evolutionary game for information dissemination. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yutao Zhang, Gongshen Liu, Jun Wu 0001, Jianhua Li 0001, Longhua Guo |
Toward interests drift mechanism for social network. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Pengze Guo, Zhi Xue |
Improved task partition based fault-tolerant rate-monotonic scheduling algorithm. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Shahrafidz Khalid, Emmanuel Conchon, Fabrice Peyrard |
Evaluation of RAIN RFID authentication schemes. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yue Lu, Xiuzhen Chen, Changsong Chen 0002 |
Security authentication mechanism based on symmetric polynomials for SCADA systems. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shiyong Zhang, Gongliang Chen, Jianhua Li 0001 |
Cube attack on reduced-round Enhanced-Bivium. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrei F. Klein, Mihai Stefanescu, Alan Saied, Kurt Swakhoven |
The performance impact of encryption in an asynchronous cloud environment. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Badis Hammi, Mohamed Cherif Rahal, Rida Khatoun |
Clustering methods comparison: Application to source based detection of botclouds. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khawla Asmi, Dounia Lotfi, Mohamed El Marraki |
An approach based on the clustering coefficient for the community detection in social networks. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2016, Paris, France, July 18-19, 2016 |
SSIC |
2016 |
DBLP BibTeX RDF |
|
1 | Siye Wang, Shiyong Zhang, Lifeng Liu, Gongliang Chen |
A challenge-response authentication for RFID using Enhanced-Trivium. |
SSIC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Huangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen 0002 |
Classified security protection evaluation for vehicle information system. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Xiuzhen Chen |
Bayesian-based model for a reputation system in vehicular networks. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yanan Wang, Xiuzhen Chen, Jianhua Li 0001 |
A new genetic-based rumor diffusion model for social networks. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fouad Amine Guenane, Ahmed Serhrouchni |
Secure access & authentication for collaborative intercloud exchange service. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Prateek Singh, Saurabh Garg, Vinod Kumar, Zia Saquib |
A testbed for SCADA cyber security and intrusion detection. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohe Fan, Kefeng Fan, Yong Wang, Ruikang Zhou |
Overview of cyber-security of industrial control system. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rida Khatoun, P. Gut, R. Doulami, Lyes Khoukhi, Ahmed Serhrouchni |
A reputation system for detection of black hole attack in vehicular networking. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zongshuai Hu, Yong Wang, Chunhua Gu, Dejun Mengm, Xiaoli Yang, Shuai Chen |
Malicious data identification in smart grid based on residual error method. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Li-Xiong Zheng, Xiao-Lin Xu, Jia Li, Lu Zhang, Xuan-Chen Pan, Zhi-Yuan Ma, Li-Hong Zhang |
Malicious URL prediction based on community detection. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Heng Chuan Tan, Jun Zhang 0019, Maode Ma, Peter Han Joo Chong, Houda Labiod |
Secure Public Key Regime (SPKR) in vehicular networks. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Rmayti, Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Dominique Gaïti |
Flooding attacks detection in MANETs. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni |
Survey on packet marking fields and information for IP traceback. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel |
Analysis of cyber security for industrial control systems. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Paul Wang, Amjad Ali 0010, William Kelly |
Data security and threat modeling for smart city infrastructure. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tubagus Mohammad Akhriza, Yinghua Ma, Jianhua Li |
A novel Fibonacci windows model for finding emerging patterns over online data stream. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gérard Memmi, Katarzyna Kapusta, Han Qiu 0001 |
Data protection: Combining fragmentation, encryption, and dispersion. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lina Zhu, Zuochang Zhan |
A random key management scheme for heterogeneous wireless sensor network. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, Shanghai, China, August 5-7, 2015 |
SSIC |
2015 |
DBLP BibTeX RDF |
|
1 | Andreas Brauchli, Depeng Li 0002 |
A solution based analysis of attack vectors on smart home systems. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mounira Msahli, Mohamed Tahar Hammi, Ahmed Serhrouchni |
Safe box cloud authentication using TLS extesion. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yue Wu 0010, Fanchao Meng, Guanghao Wang, Ping Yi |
A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue |
Security in MIMO wireless hybrid channel with artificial noise. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dhavy Gantsou |
On the use of security analytics for attack detection in vehicular ad hoc networks. |
SSIC |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #68 of 68 (100 per page; Change: )
|
|