论文列表及评分结果

Reputation management in collaborative computing systems.

电商所评分:4

点击查看评分详情!

FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis.

电商所评分:2

点击查看评分详情!

Reliable relay-based broadcasting through formal concept analysis for WSNs.

电商所评分:10

点击查看评分详情!

Binary field multiplication on ARMv8.

电商所评分:4

点击查看评分详情!

Time-bound key-aggregate encryption for cloud storage.

电商所评分:9

点击查看评分详情!

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks.

电商所评分:1

点击查看评分详情!

On the estimation of the second largest eigenvalue of Markov ciphers.

电商所评分:8

点击查看评分详情!

Taming transitive permission attack via bytecode rewriting on Android application.

电商所评分:7

点击查看评分详情!

Linear (k, n) secret sharing scheme with cheating detection.

电商所评分:2

点击查看评分详情!

Challenges and opportunities in next-generation cyberspace security.

电商所评分:9

点击查看评分详情!

Trends in modern information hiding: techniques, applications, and detection.

电商所评分:8

点击查看评分详情!

A guide to trust in mobile ad hoc networks.

电商所评分:1

点击查看评分详情!

Refined Shacham-Waters ring signature scheme in Seo-Cheon framework.

电商所评分:2

点击查看评分详情!

Covert channel-internal control protocols: attacks and defense.

电商所评分:5

点击查看评分详情!

Characterizing flash events and distributed denial-of-service attacks: an empirical investigation.

电商所评分:9

点击查看评分详情!

Quantitative threat situation assessment based on alert verification.

电商所评分:9

点击查看评分详情!

Identity-based key management for cloud computing.

电商所评分:8

点击查看评分详情!

Understanding a prospective approach to designing malicious social bots.

电商所评分:3

点击查看评分详情!

Traceback model for identifying sources of distributed attacks in real time.

电商所评分:2

点击查看评分详情!

Corrigendum to "New Rational Parties Relying on Reputation".

电商所评分:10

点击查看评分详情!

PSO-based optimal peer selection approach for highly secure and trusted P2P system.

电商所评分:3

点击查看评分详情!

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.

电商所评分:5

点击查看评分详情!

Interoperable semantic access control for highly dynamic coalitions.

电商所评分:4

点击查看评分详情!

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.

电商所评分:4

点击查看评分详情!

Security and networking for cyber-physical systems.

电商所评分:10

点击查看评分详情!

PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.

电商所评分:8

点击查看评分详情!

Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework.

电商所评分:7

点击查看评分详情!

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges.

电商所评分:10

点击查看评分详情!

Attribution in cyberspace: techniques and legal implications.

电商所评分:2

点击查看评分详情!

Outsourcing secure two-party computation as a black box.

电商所评分:6

点击查看评分详情!