Printer Friendly

Articles from Security and Communication Networks (January 1, 2020)

1-11 out of 11 article(s)
Title Author Type Words
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA. Shen, Zhidong; Zhang, Yuhao; Chen, Weiying 7255
A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices. Phu, Tran Nghi; Dang, Kien Hoang; Quoc, Dung Ngo; Dai, Nguyen Tho; Binh, Nguyen Ngoc 8860
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy. Li, Lin; Chang, Chin-Chen; Chen, Hefeng 10441
Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking. Zhu, Xianwei; Chang, ChaoWen; Xi, Qin; Zuo, ZhiBin 9270
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. Pan, Jiaye; Zhuang, Yi; Sun, Binglin 13986
Compact Implementations of HIGHT Block Cipher on IoT Platforms. Kim, Bohun; Cho, Junghoon; Choi, Byungjun; Park, Jongsun; Seo, Hwajeong 6265
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots. Xue, Mingfu; Yuan, Chengxiang; Wang, Jian; Liu, Weiqiang Report 11399
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning. Zhang, Yuchen; Liu, Jing 9575
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes. Liu, Jingang; Wang, Yongge; Yi, Zongxiang; Lin, Zhiqiang 8128
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. Xie, Congge; Weng, Jian; Wen, Jinming 10081
Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing. Zeng, Jianping; Wu, Shuang; Chen, Yanyu; Zeng, Rui; Wu, Chengrong 11614

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |