×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [3]
北京航空航天大学 [3]
兰州大学 [2]
山东大学 [2]
武汉大学 [2]
兰州理工大学 [1]
更多...
内容类型
会议论文 [16]
发表日期
2021 [1]
2018 [3]
2017 [1]
2016 [3]
2015 [1]
2014 [2]
更多...
学科主题
computer s... [1]
mine and q... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Trust Evaluation and Anomaly Detection Model of Industrial Control Equipment Based on Multiservice and Multi-attribute
会议论文
Chengdu, China, December 10-13, 2021
作者:
Chen X(陈鑫)
;
Liu XD(刘贤达)
;
Jiang YH(蒋一恒)
;
Wang C(王晨)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/03/15
ICS
trust model
anomaly detection
multi-service
multi-attribute
support algorithm
vector similarity algorithm
Understanding the behaviors of BGP-based DDoS protection services
会议论文
作者:
Tung, Tony Miu
;
Wang, Chenxu
;
Wang, Jinhe
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/11/19
DDoS Attack
Ddos attack mitigations
Distributed denial of service attack
DPS behavior
Malicious traffic
Routing dynamics
Improved Detection of User Malicious Behavior through Log Mining based on IHMM
会议论文
5th International Conference on Systems and Informatics (ICSAI), Nanjing, PEOPLES R CHINA, NOV 10-12, 2018
作者:
Liu, Chenchen
;
Zhong, Yi*
;
Wang, Yuanli
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/04
information security
discrete data sequences
Hidden Markov Models
IHMM
Robust detection of android UI similarity
会议论文
IEEE International Conference on Communications
作者:
Mao, J.
;
Bian, J.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
User interfaces
Abnormal behavior
Fundamental features
Malicious codes
Robust detection
Sensitive informations
Unique features
Visual appearance
Visual similarity
Android (operating system)
An android malware detection system based on behavior comparison analysis
会议论文
作者:
Tao, Jing
;
Zhang, Yan
;
Cao, Pengfei
;
Wang, Zheng
;
Zhao, Qiqi
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/11/26
Android applications
Android malware
Behavior analysis
Behavior comparisons
Design and Development
Malicious behavior
Real environments
Strong consistency
Android App Malicious Behavior Detection Based on User Intention
会议论文
作者:
Fu, JianMing
;
Li, PengWei
;
Lin, Yan
;
Ding, Shuang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/05
Android malware
Security-sensitive behavior
User intention
Monitor
Hijack
Android app malicious behavior detection based on user intention
会议论文
作者:
Fu, Jianming
;
Li, Pengwei
;
Lin, Yan
;
Ding, Shuang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
Detecting Malicious Behavior and Collusion for Online Rating System
会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:
Cao, Liu
;
Sun, Yuqing
;
Wang, Shaoqing
;
Li, Mingzhu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
AppSpear: Bytecode decrypting and DEX reassembling for packed android malware
会议论文
作者:
Yang, Wenbo
;
Zhang, Yuanyuan
;
Li, Juanru
;
Shu, Junliang
;
Li, Bodong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/02
Android malware
Code protections
DEX reassembling
Experimental evaluation
Malicious behavior
Malware detection
Program analysis
Systematic study
METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION
会议论文
3rd IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), PEOPLES R CHINA, 2014-11-27
作者:
Li, Wenwu
;
Li, Chao
;
Duan, Miyi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/06
Analysis of malicious code
detection of malicious code
stain diffusion
©版权所有 ©2017 CSpace - Powered by
CSpace