default search action
10th ICCNS 2020: Tokyo, Japan
- ICCNS 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020. ACM 2020, ISBN 978-1-4503-8903-7
- Arash Habibi Lashkari, Gurdip Kaur, Abir Rahali:
DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning. 1-13 - Tomoya Yamashita, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura:
Slow Scan Attack Detection Based on Communication Behavior. 14-20 - Na Lv, Tianyu Chen, Yuan Ma:
Analysis on Entropy Sources based on Smartphone Sensors. 21-31 - Onur Barut, Rebecca Zhu, Yan Luo, Tong Zhang:
TLS Encrypted Application Classification Using Machine Learning with Flow Feature Engineering. 32-41 - Pinchen Cui, David A. Umphress:
Towards Unsupervised Introspection of Containerized Application. 42-51 - Sultan Alasmari, Weichao Wang, Yu Wang:
Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing. 52-59 - Ming Yang, Xuexian Hu, Jianghong Wei, Qihui Zhang, Wenfen Liu:
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain. 60-69 - Abir Rahali, Arash Habibi Lashkari, Gurdip Kaur, Laya Taheri, François Gagnon, Frédéric Massicotte:
DIDroid: Android Malware Classification and Characterization Using Deep Image Learning. 70-82 - Agustín Chancusi, Paúl Diestra, Damián Nicolalde:
Vulnerability Analysis of the Exposed Public IPs in a Higher Education Institution. 83-90 - Kok-Seng Wong, Nguyen Anh Tu, Anuar Maratkhan, M. Fatih Demirci:
A Privacy-Preserving Framework for Surveillance Systems. 91-98 - Xuefei Wang, Rui Ma, Donghai Tian, Xiajing Wang:
VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory. 99-108 - Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Identification of Spoofed Emails by applying Email Forensics and Memory Forensics. 109-114 - Florian Adamsky, Daniel Kaiser, Michael Steglich, Thomas Engel:
Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations. 115-122 - Edlira Martiri, Bian Yang:
On the predictability of biometric honey templates, based on Bayesian inference. 123-134 - Yongfu Wang, Ying Zhou, Xiaohai Zou, Quanqiang Miao, Wei Wang:
The analysis method of security vulnerability based on the knowledge graph. 135-145
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.