中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
会议名
8th International Conference on Information Systems Security and Privacy (ICISSP 2022)
中译名
《第八届国际信息系统安全与隐私会议》
机构
Institute for Systems and Technologies of Information, Control and Communication (INSTICC)
会议日期
9-11 February 2022
会议地点
Online
出版年
2022
馆藏号
343521
题名
作者
出版年
"Fake News Detector": An Automatic System for the Reliability Evaluation of Digital News
Claudio Cilli; Giulio Magnanini; Lorenzo Manduca; Fabrizio Venettoni
2022
Network Intrusion Detection: A Comprehensive Analysis of CIC-IDS2017
Arnaud Rosay; Eloise Cheval; Florent Carlier; Pascal Leroux
2022
Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity
Mohammad Anagreh; Peeter Laud; Eero Vainikko
2022
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
Amir Naseredini; Stefan Gast; Martin Schwarzl; Pedro Miguel Sousa Bernardo; Amel Smajic; Claudio Canella; Martin Berger; Daniel Gruss
2022
Semantic Attack on Disassociated Transactions
Asma AlShuhail; Jianhue Shao
2022
Implementing Post-quantum Cryptography for Developers
Julius Hekkala; Kimmo Halunen; Visa Vallivaara
2022
Security Issue Classification for Vulnerability Management with Semi-supervised Learning
Emil Wareus; Anton Duppils; Magnus Tullberg; Martin Hell
2022
Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities
Engla Rencelj Ling; Mathias Ekstedt
2022
Containment Strategy Formalism in a Probabilistic Threat Modelling Framework
Per Fahlander; Mathias Ekstedt; Preetam Mukherjee; Ashish Kumar Dwivedi
2022
Culturally-sensitive Cybersecurity Awareness Program Design for Iranian High-school Students
Rooya Karimnia; Kaie Maennel; Mahtab Shahin
2022
Analysis and Enhancement of Self-sovereign Identity System Properties Compiling Standards and Regulations
Charnon Pattiyanon; Toshiaki Aoki
2022
Public Key Compression and Fast Polynomial Multiplication for NTRU using the Corrected Hybridized NTT-Karatsuba Method
Rohon Kundu; Alessandro de Piccoli; Andrea Visconti
2022
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps
Md Rashedur Rahman; Elizabeth Miller; Moinul Hossain; Aisha Ali-Gombe
2022
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs
Leonardo Veronese; Francesco Palmarini; Riccardo Focardi; Flaminia L. Luccio
2022
Detecting Obfuscated Malware using Memory Feature Engineering
Tristan Carrier; Princy Victor; Ali Tekeoglu; Arash Habibi Lashkari
2022
Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning
Heloise Maurel; Santiago Vidal; Tamara Rezk
2022
Differential-linear Attacks on Permutation Ciphers Revisited: Experiments on Ascon and DryGASCON
Asli Basak Civek; Cihangir Tezcan
2022
On Tracking Ransomware on the File System
Luigi Catuogno; Clemente Galdi
2022
SecTL: Secure and Verifiable Transfer Learning-based inference
Abbass Madi; Oana Stan; Renaud Sirdey; Cedric Gouy-Pailler
2022
TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology
David Werden; Matthew Muccioli; Anyi Liu
2022
1
2
3
4
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
机械工业信息研究院 2018-2024