


default search action
9th ICCNS 2019: Chongqing, China
- ICCNS 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019. ACM 2019, ISBN 978-1-4503-7662-4

- Zufa Zhang, Jianqiang Dai, Lingling Zhao, Songling Qin:

A Web Services Testing Approach based on Difference Measurement and Adaptive Random Testing. 1-5 - Jianing Zhang, Xingtao Zhuang, Yunfang Chen:

Android Malware Detection Combined with Static and Dynamic Analysis. 6-10 - Ping Yang, Hui Shu, Xiaobing Xiong, Fei Kang:

Semantic-based Malware Behavior Description: Past and Future. 11-19 - Bo Liu, Honghe Ge, Jinfu Chen, Qihao Bao:

An Automatic Testing Platform for Object-oriented Software based on Code Coverage. 20-24 - Kaige Yang, Shenghui Su:

Secure Email Login Based on Lightweight Asymmetric Identities. 25-29 - Chen Yang, Wei Yan:

Location Privacy Protection Scheme Based on Location Services. 30-33 - Qingqing Chang, Shenghui Su:

Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping. 34-39 - Rui Dai, Chuan Gao, Bo Lang, Lixia Yang, Hongyu Liu, Shaojie Chen

:
SSL Malicious Traffic Detection Based On Multi-view Features. 40-46 - Bin Kong, Zhangpu Liu, Guangming Zhou, Xiaoyan Yu:

A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics. 47-50 - Han Li, Chonglin Gu, Yi Chen, Wenye Li:

An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with Blockchain. 51-57 - Wu-Chuan Yang, Lien-Yuan Ting:

Embedded Authentication and Blockchain in Micro-course. 58-62 - Zijie Lin, Liangliang Gao, Xuexian Hu, Yuxuan Zhang, Wenfen Liu:

Differentially Private Graph Clustering Algorithm Based on Structure Similarity. 63-68 - Huajun Liu, Zhanghui Liu, Yanhua Liu, Xiaoling Gao:

Abnormal Network Traffic Detection based on Leaf Node Density Ratio. 69-74 - Yanyan Chen, Wenxian Han:

Research on Automatically Switched Optical Network Security Based on Quantum Key Distribution. 75-78 - Xiaoling Gao, Yanhua Liu, Yanbin Qiu, Huajun Liu:

A Comprehensive Assessment Method of Asset Importance for Key Asset Protection. 79-83 - Yingying Qi, Wenli Shang, Xiaojun He:

A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series. 84-91 - Enjian Bai, Fangyuan Qin, Sijing Chen:

Effective Scrambling Scheme for Physical Layer Security. 92-96 - Biqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao:

Attack Intent Analysis Method Based on Attack Path Graph. 97-102 - Yu Kun:

Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL. 103-108 - Xuerong Yue, Jiji Gao, Zhibin Chen:

A Polynomial Time Algorithm for Scheduling on Processing Time Constraints. 109-113 - Xinli Xiong, Linru Ma, Chao Cui:

Simulation Environment of Evaluation and Optimization for Moving Target Defense: A SimPy Approach. 114-117 - Jiaxin Liu, Xuerong Yue, Zhibin Chen:

A Note on Polynomial-time Solvability for Edge Packing on Graphs. 118-122 - Fanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou:

Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm. 123-127 - Hua Jiang, Jinpo Fan, Gang Zhang, Ronglei Hu:

Design and Implementation of Integrated Access VPN Gateway. 128-132 - Yucheng Wang, Daohua Zhu, Qing Wu, Yajuan Guo, Chonghai Yang, Wenjiang Feng:

Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network. 133-136 - Xin Song, Xue Huang, Haijun Qian:

Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks. 137-141 - Wen Yang, Meijuan Yin, Xiaonan Liu, Can Wang, Shunran Duan:

Multi-source Landmark Fusion based on Machine Learning. 142-148 - Qipeng He, Cong Dai, Rong Si, Jianwen Lin:

Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop. 149-153 - Phan The Duy, Le Duy An, Van-Hau Pham:

Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN. 154-158 - Kaihang Zhou, Lei Shi, Jiahua Wei, Yang Xue, Jie Tang:

Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States. 159-163

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














