default search action
1st SciSec 2018: Beijing, China
- Feng Liu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11287, Springer 2018, ISBN 978-3-030-03025-4
Metrics and Measurements
- Zhi Wang, Jinli Zhang, Qixu Liu, Xiang Cui, Junwei Su:
Practical Metrics for Evaluating Anonymous Networks. 3-18 - Yinwei Li, Zhen-Hao Zhang, Dongmei Fan, Yurong Song, Guo-Ping Jiang:
Influence of Clustering on Network Robustness Against Epidemic Propagation. 19-33 - Ningyuan Cao, Kun Lv, Changzhen Hu:
An Attack Graph Generation Method Based on Parallel Computing. 34-48
Cybersecurity Dynamics
- Hao Qiang, Wenlian Lu:
A Note on Dependence of Epidemic Threshold on State Transition Diagram in the SEIC Cybersecurity Dynamical System Model. 51-64 - Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia, Yuantian Zhang:
Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. 65-80 - Chunming Zhang:
Computer Viruses Propagation Model on Dynamic Switching Networks. 81-95 - Chunming Zhang, Junbiao Peng, Jingwei Xiao:
Advanced Persistent Distributed Denial of Service Attack Model on Scale-Free Networks. 96-112
Attacks and Defenses
- Qingshan Kong, Bo Liu:
Security and Protection in Optical Networks. 115-125 - Anyi Liu, Guangzhi Qu:
H-Verifier: Verifying Confidential System State with Delegated Sandboxes. 126-140 - Xiang-Qian Liang, Sha-sha Wang, Yong-hua Zhang, Guang-Bao Xu:
Multi-party Quantum Key Agreement Against Collective Noise. 141-155 - Kuan He, Bin Yu:
An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks. 156-171 - Yexia Cheng, Yuejin Du, Jin Peng, Shen He, Jun Fu, Baoxu Liu:
New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications. 172-180 - Zhengyuan Zhang, Kun Lv, Changzhen Hu:
Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method. 181-190 - Rishikesh Sahay, D. A. Sepulveda, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems. 191-198 - Jiaxi Wu, Xiaotong Lin, Zhiqiang Lin, Yi Tang:
A Security Concern About Deep Learning Models. 199-206 - Xiang Zhong, Luxing Yang, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang:
Defending Against Advanced Persistent Threat: A Risk Management Perspective. 207-215 - Datian Peng, Jianmin Dong, Jianan Jian, Qinke Peng, Bo Zeng, Zhi-Hong Mao:
Economic-Driven FDI Attack in Electricity Market. 216-224
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.