掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
IEEE Security and Privacy Workshops
IEEE Security and Privacy Workshops
召开年:
2014
召开地:
San Jose, CA(US)
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
Nail: A Practical Interface Generator for Data Formats
机译:
钉子:实用的数据格式接口生成器
作者:
Bangert J.
;
Zeldovich N.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
data handling;
data structures;
grammars;
user interfaces;
Nail;
binary formats;
data formats;
parser generators;
parser-expression based grammar;
practical interface generator;
protocol generation;
protocol parsing;
Data models;
Generators;
Grammar;
Nails;
Protocols;
Semantics;
Syntactics;
Binary formats;
LangSec;
Offset field;
Output;
Parsing;
2.
Detecting Unknown Insider Threat Scenarios
机译:
检测未知的内部威胁场景
作者:
Young W.T.
;
Memory A.
;
Goldberg H.G.
;
Senator T.E.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
security of data;
ablation experiments;
ensemble method;
ensemble-based unsupervised technique;
insider threat detection prototype;
potential insider threat instances;
real monitored computer usage activity;
scenario-based detectors;
Computers;
Detectors;
Feature extraction;
Monitoring;
Organizations;
Prototypes;
Uniform resource locators;
anomaly detection;
experimental case study;
insider threat;
unsupervised ensembles;
3.
Mind Your Language(s): A Discussion about Languages and Security
机译:
注意您的语言:有关语言和安全性的讨论
作者:
Jaeger E.
;
Levillain O.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
programming languages;
security of data;
software tools;
ANSSI;
French Network and Information Security Agency;
development tools;
intrinsic security characteristics;
programming languages;
Cryptography;
Encapsulation;
Java;
Software;
Standards;
compilation;
evaluation;
programming languages;
security;
software development;
software engineering;
4.
Insider Attack Identification and Prevention Using a Declarative Approach
机译:
使用声明性方法识别和预防内部攻击
作者:
Sarkar A.
;
Kohler S.
;
Riddle S.
;
Ludaescher B.
;
Bishop M.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
computer crime;
cryptography;
data flow graphs;
data privacy;
directed graphs;
logic programming;
attack model;
data flow based directed graphs;
declarative approach;
improvement opportunities;
insider attack identification;
insider attack prevention;
logic rules;
mapping relation;
nonmalicious steps;
privacy;
process models;
security;
similarity match;
vulnerability analysis;
Data models;
Diamonds;
Impedance matching;
Nominations and elections;
Process control;
Robustness;
Security;
Declarative Programming;
Process Modeling;
Vulnerability Analysis;
5.
Ethos' Deeply Integrated Distributed Types
机译:
Ethos的深度集成分布式类型
作者:
Petullo W.M.
;
Wenyuan Fei
;
Solworth J.A.
;
Gavlin P.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
operating systems (computers);
program debugging;
programming languages;
safety-critical software;
trusted computing;
Ethos operating system;
deeply integrated distributed types;
language runtime;
multilingual Ethos;
operating system approach;
programming languages;
runtime-agnostic Ethos;
security-sensitive bugs;
type constraints;
type safety;
Kernel;
Protocols;
Robustness;
Runtime;
Safety;
Security;
Semantics;
Operating system;
language-theoretic security;
type system;
6.
Insider Threat Identification by Process Analysis
机译:
通过流程分析识别内部威胁
作者:
Bishop M.
;
Conboy H.M.
;
Huong Phan
;
Simidchieva B.I.
;
Avrunin G.S.
;
Clarke L.A.
;
Osterweil L.J.
;
Peisert S.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
security of data;
computer security;
insider attack;
insider threat identification;
intrusion detection mechanism;
process analysis;
process modeling;
Analytical models;
Drugs;
Fault trees;
Hazards;
Logic gates;
Nominations and elections;
Software;
data exfiltration;
elections;
insider threat;
process modeling;
sabotage;
7.
Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits
机译:
社会工程漏洞产生的无意内部威胁分析
作者:
Greitzer F.L.
;
Strozer J.R.
;
Cohen S.
;
Moore A.P.
;
Mundie D.
;
Cowley J.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
security of data;
UIT mitigation strategies;
UIT social engineering incidents;
social engineering exploits;
unintentional insider threats;
Computers;
Context;
Educational institutions;
Electronic mail;
Organizations;
Security;
Taxonomy;
social engineering;
unintentional insider threat;
8.
Understanding Insider Threat: A Framework for Characterising Attacks
机译:
了解内部威胁:表征攻击的框架
作者:
Nurse J.R.C.
;
Buckley O.
;
Legg P.A.
;
Goldsmith M.
;
Creese S.
;
Wright G.R.T.
;
Whitty M.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
security of data;
grounded framework;
insider threat;
psychological theory;
Companies;
Context;
Educational institutions;
Employment;
History;
Psychology;
Security;
attack chain;
case studies;
insider threat;
psychological indicators;
technical;
threat framework;
9.
DF-C2M2: A Capability Maturity Model for Digital Forensics Organisations
机译:
DF-C2M2:数字取证组织的能力成熟度模型
作者:
Al Hanaei E.H.
;
Rashid A.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Capability Maturity Model;
ISO standards;
digital forensics;
police data processing;
ASCLD-Lab International requirements;
DF-C2M2 model;
ISO 17025 standard;
business requirements;
capability maturity model;
digital forensics organisation;
law enforcement agency;
regulatory requirements;
Capability maturity model;
Conferences;
Digital forensics;
ISO standards;
Law enforcement;
ASCLD-Lab;
Capability Maturity;
Digital Forensics;
ISO 17025;
10.
A Case Study in Malware Research Ethics Education: When Teaching Bad is Good
机译:
恶意软件研究伦理教育中的案例研究:教学不好时
作者:
Sullins J.P.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
computer science education;
educational courses;
invasive software;
teaching;
computer ethics;
computer science course;
cyber-security;
information ethics;
malware ethics teaching;
malware programming techniques;
malware research ethics education;
Computers;
Educational institutions;
Ethics;
Malware;
Malware ethics;
computer ethics;
research ethics;
information ethics;
malware education;
11.
Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation Procedures
机译:
电子电表的共谋和欺诈检测-法医调查程序的用例
作者:
De Faria R.A.
;
Ono Fonseca K.V.
;
Schneider B.
;
Sing Kiong Nguang
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
law;
smart meters;
smart power grids;
electricity theft detection;
electronic energy meters;
forensics investigation procedures;
smart grid;
smart meters;
Electricity;
Energy consumption;
Microcontrollers;
Radio frequency;
Security;
Sensors;
Switches;
electricity measurement fraud;
electronic meter;
forensics investigation procedure;
tampering technique;
12.
Structure Matters - A New Approach for Data Flow Tracking
机译:
结构问题-数据流跟踪的新方法
作者:
Lovat E.
;
Kelbert F.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
data flow analysis;
data flow computing;
UC enforcement;
containers;
data access;
data flow tracking;
false positive detection rate;
formal model;
information leveraging;
inherent data structure;
over-approximation problem mitigation;
technical representations;
usage control;
Containers;
Data models;
Discrete Fourier transforms;
Operating systems;
Postal services;
Security;
Semantics;
data flow tracking;
data structure;
usage control;
13.
Ethics in Data Sharing: Developing a Model for Best Practice
机译:
数据共享中的道德规范:开发最佳实践模型
作者:
Dietrich S.
;
Van Der Ham J.
;
Pras A.
;
Van Rijswijk Deij R.
;
Shou D.
;
Sperotto A.
;
Van Wynsberghe A.
;
Zuck L.D.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
ethical aspects;
security of data;
best practice;
computer security;
data sharing;
ethics;
network security;
Computational modeling;
Data models;
Data privacy;
Ethics;
Internet;
Security;
Seminars;
best practice;
computer security;
data sharing;
ethics;
14.
P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage
机译:
P2U:一种用于辅助数据共享和使用的隐私策略规范语言
作者:
Iyilade J.
;
Vassileva J.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Web services;
data privacy;
economics;
social networking (online);
specification languages;
P2U;
P3P;
Web 2.0;
Web services;
economic social incentives;
platform for privacy preferences;
privacy policy specification language;
purpose-to-use;
secondary data sharing;
secondary data usage;
social networking sites;
Context;
Data privacy;
Economics;
Information management;
Mobile communication;
Organizations;
Privacy;
Policy Languages;
Privacy;
Secondary Use;
Usage Control;
15.
The Pitfalls of Protocol Design: Attempting to Write a Formally Verified PDF Parser
机译:
协议设计的陷阱:尝试编写经过正式验证的PDF解析器
作者:
Bogk A.
;
Schopl M.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
document handling;
functional programming;
grammars;
security of data;
theorem proving;
Acrobat Reader implementation;
Coq;
Curry-Howard isomorphism;
PDF data format;
combinator-based parser;
complex data formats;
denial of service attacks;
formally verified PDF parser;
functional programming language;
input-driven exploitation;
parser combinators;
protocol design;
theorem prover;
Indexes;
Portable document format;
Privacy;
Security;
Software;
Syntactics;
Writing;
16.
Parsifal: A Pragmatic Solution to the Binary Parsing Problems
机译:
Parsifal:二进制解析问题的实用解决方案
作者:
Levillain O.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
program compilers;
OCaml parser;
Parsifal framework;
binary parsing problems;
format complexity;
parser robustness;
pervasive software basic blocks;
Containers;
Density estimation robust algorithm;
Internet;
Protocols;
Robustness;
Standards;
Writing;
OCaml;
Parsifal;
binary parsers;
code generation;
preprocessor;
17.
Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis
机译:
将生成的数据模型与形式无效化相结合,以进行内部威胁分析
作者:
Kammuller F.
;
Probst C.W.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
formal logic;
formal specification;
formal verification;
public key cryptography;
Lowe-attack;
NSPK;
counter-intelligence expert;
data generation technique;
data invalidation technique;
data refinement;
formal invalidation;
generated data model;
insider attack data;
insider threat analysis;
logic based mechanical approach;
logic specification;
model checking organizational structure;
security verification;
Analytical models;
Computational modeling;
Data models;
Internet;
Protocols;
Public key;
Insider threats;
policies;
formal methods;
18.
The Tricks of the Trade: What Makes Spam Campaigns Successful?
机译:
技巧:什么使垃圾邮件运动成功?
作者:
Iedemska J.
;
Stringhini G.
;
Kemmerer R.
;
Kruegel C.
;
Vigna G.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
computer crime;
invasive software;
unsolicited e-mail;
botnet creators;
command and control servers;
cyber criminals;
economic model;
infected machines;
spam campaigns;
spam content;
spam delivery process;
spamming botnets;
stored data analysis;
Databases;
Guidelines;
Manuals;
Mathematical model;
Servers;
Unsolicited electronic mail;
Botnet;
Cybercrime;
Spam;
19.
RAPPD: A Language and Prototype for Recipient-Accountable Private Personal Data
机译:
RAPPD:收件人负责的私人个人数据的语言和原型
作者:
Kang Y.J.
;
Schiffman A.M.
;
Shrager J.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
data privacy;
electronic mail;
hypermedia markup languages;
HTML;
JavaScript;
email reader;
private data communication;
recipient-accountable private personal data;
Data privacy;
Electronic mail;
IP networks;
Law;
Medical services;
Privacy;
Prototypes;
accountability;
auditing;
creative commons;
email privacy;
privacy;
trust;
usability;
usable privacy;
20.
Resilience as a New Enforcement Model for IT Security Based on Usage Control
机译:
弹性作为基于使用控制的IT安全新实施模型
作者:
Wohlgemuth S.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
information technology;
security of data;
IT applications;
IT security model;
IT systems;
critical activity;
enforcement model;
indispensable enablers;
innovative IT infrastructure applications;
privacy;
security policy model;
spontaneous information exchange;
sustainable welfare;
usage control;
Adaptation models;
Adaptive systems;
Availability;
Information exchange;
Privacy;
Resilience;
Security;
data provenance;
identity management;
resilience;
security and privacy;
usage control;
21.
Steganography in Long Term Evolution Systems
机译:
长期演进系统中的隐写术
作者:
Grabska I.
;
Szczypiorski K.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Long Term Evolution;
packet radio networks;
steganography;
telecommunication security;
LTE networks;
LaTEsteg;
Long Term Evolution systems;
data transfer;
physical layer padding;
steganographic method;
Channel capacity;
IP networks;
Long Term Evolution;
Phase shift keying;
Proposals;
Protocols;
Throughput;
4G;
LTE;
Steganographic Algorithm;
Steganographic Channel;
Steganography;
22.
Gringotts: Securing Data for Digital Evidence
机译:
Gringotts:保护数据以获取数字证据
作者:
Redfield C.M.S.
;
Date H.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
cryptography;
data integrity;
data recording;
digital signatures;
digital storage;
Gringotts;
accumulated institutional data integrity;
business infrastructure;
cloud processing;
cryptography;
data securing;
digital evidence record syntax;
digital signatures;
digital storage;
evidential data integrity;
legal disputes;
legal evidence;
long-term archival systems;
security systems;
surveillance camera network;
Cameras;
Cryptography;
Databases;
Protocols;
Receivers;
Servers;
Digital Evidence;
Digital Signatures;
Evidence Record Syntax;
Long-Term Authenticity;
Stream Data;
23.
Automatic Identification of Replicated Criminal Websites Using Combined Clustering
机译:
使用组合聚类自动识别复制的犯罪网站
作者:
Drew J.
;
Moore T.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Web sites;
pattern classification;
security of data;
Web site content;
Web site structure;
advanced-fee fraud scheme;
combined clustering;
cyber criminals;
duplicated content;
fake-escrow services;
high-yield investment programs;
online Ponzi scheme;
replicated criminal Web sites;
Clustering algorithms;
Clustering methods;
HTML;
Indexes;
Investment;
Manuals;
Sociology;
24.
Can We Identify NAT Behavior by Analyzing Traffic Flows?
机译:
我们可以通过分析流量来识别NAT行为吗?
作者:
Gokcen Y.
;
Foroushani V.A.
;
Heywood A.N.Z.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Internet;
learning (artificial intelligence);
telecommunication traffic;
NAT behavior;
machine learning;
malicious behaviors;
network address translation devices;
passive fingerprinting approach;
payload information;
traffic flows;
Browsers;
Classification algorithms;
Computers;
Fingerprint recognition;
IP networks;
Internet;
Payloads;
Network address translation classification;
machine learning;
traffic analysis;
traffic flows;
25.
Constructing and Analyzing Criminal Networks
机译:
犯罪网络的构建与分析
作者:
Sarvari H.
;
Abozinadah E.
;
Mbaziira A.
;
Mccoy D.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
graph theory;
social networking (online);
unsolicited e-mail;
Facebook profiles;
criminal network analysis;
criminal network construction;
criminal organizations;
criminally-focused public group identification;
data leakage;
high-rank criminal profiles;
large-scale centralized criminal communities;
large-scale criminal social graph structure analysis;
public social graph;
publicly leaked criminal e-mail addresses;
social graph node;
Communities;
Electronic mail;
Facebook;
Joining processes;
Manuals;
Organizations;
analysis;
community detection;
criminal networks;
cybercrime;
social graph;
26.
Improving Hard Disk Contention-Based Covert Channel in Cloud Computing
机译:
改善云计算中基于硬盘竞争的隐蔽通道
作者:
Lipinski B.
;
Mazurczyk W.
;
Szczypiorski K.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
cloud computing;
hard discs;
public domain software;
security of data;
steganography;
CloudSteg;
Open Stack open-source cloud environment;
cloud computing;
covert secret data exchange;
hard disk contention-based covert channel;
steganographic methods;
Bandwidth;
Cloud computing;
Computational modeling;
Hard disks;
Robustness;
Synchronization;
cloud computing;
covert channel;
information hiding;
steganography;
27.
iCOP: Automatically Identifying New Child Abuse Media in P2P Networks
机译:
iCOP:在P2P网络中自动识别新的虐待儿童媒体
作者:
Peersman C.
;
Schulze C.
;
Rashid A.
;
Brennan M.
;
Fischer C.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
computer crime;
image classification;
image forensics;
peer-to-peer computing;
text analysis;
video signal processing;
CSA media;
P2P monitoring tools;
P2P networks;
automatic child abuse media identification;
child sex abuse media;
filename technique;
iCOP toolkit complementarity;
iCOP toolkit usability;
law enforcement agencies;
media analysis technique;
offender activity detection;
peer-to-peer networks;
unknown media detection;
Engines;
Feature extraction;
Law enforcement;
Media;
Skin;
Streaming media;
Visualization;
child protection;
cyber crime;
image classification;
paedophilia;
peer-to-peer computing;
text analysis;
28.
PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations
机译:
PeerShark:通过跟踪对话检测对等僵尸网络
作者:
Narang P.
;
Ray S.
;
Hota C.
;
Venkatakrishnan V.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
computer network security;
invasive software;
peer-to-peer computing;
telecommunication traffic;
2-tuple conversation-based approach;
P2P applications;
P2P botnet traffic;
PeerShark;
anomalous network;
communication behavior;
communication patterns;
conversations tracking;
flow-based detection;
peer-to-peer botnets detection;
port-oblivious;
protocol-oblivious;
standard discovery techniques;
Electronic mail;
Feature extraction;
Firewalls (computing);
IP networks;
Internet;
Peer-to-peer computing;
Ports (Computers);
botnet;
machine learning;
peer-to-peer;
29.
Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud
机译:
云中状态数据使用控制的架构,工作流和原型
作者:
Lazouski A.
;
Mancini G.
;
Martinelli F.
;
Mori P.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
cloud computing;
security of data;
access rule;
cloud computing;
data objects;
distributed enforcement;
distributed systems;
stateful data usage control;
usage rule;
Authorization;
Concurrent computing;
Data models;
Distributed databases;
Process control;
Resource management;
Attributes;
Cloud System;
Concurrency Control;
UCON;
Usage Control;
30.
Towards Forensic Analysis of Attacks with DNSSEC
机译:
使用DNSSEC进行法医分析
作者:
Shulman H.
;
Waidner M.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
cache storage;
computer crime;
cryptographic protocols;
digital forensics;
digital signatures;
invasive software;
DNS cache poisoning attacks;
DNS infrastructure;
DNS security;
DNSSEC;
Internet networks;
Internet services;
MitM capabilities;
a-posteriori forensic analysis;
advanced cyber attacks;
attacks detection;
censorship;
challenge-response defences;
cryptographic evidences;
cryptographic mechanisms;
digital signature;
domain registrars;
malware;
man-in-the-middle;
name servers;
spam;
thwarting attacks;
users activities monitoring;
Computer crime;
Cryptography;
Forensics;
Internet;
Routing;
Servers;
DNS cache-poisoning;
DNSSEC;
cryptographic evidences;
cyber attacks;
digital signatures;
security;
31.
Hurdles for Genomic Data Usage Management
机译:
基因组数据使用管理的障碍
作者:
Naveed M.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
bioinformatics;
data protection;
genomics;
medical information systems;
genomic data privacy protection;
genomic data usage management;
Bioinformatics;
Cryptography;
DNA;
Data privacy;
Genomics;
Privacy;
Sequential analysis;
32.
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
机译:
相互增强声誉传播的企业网络资产风险评分
作者:
Xin Hu
;
Ting Wang
;
Stoecklin M.P.
;
Schales D.L.
;
Jiyong Jang
;
Sailer R.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
business data processing;
firewalls;
invasive software;
risk analysis;
MUSE;
antivirus software;
asset risk scoring;
cyber security attacks;
enterprise network;
firewalls;
intrusion detection-prevention systems;
mutually reinforced reputation propagation;
risk assessment;
security protection mechanisms;
Belief propagation;
Bipartite graph;
Data mining;
Intrusion detection;
Malware;
Servers;
Risk Scoring;
mutually reinforced principles;
reputation propagation;
33.
Phantom Boundaries and Cross-Layer Illusions in 802.15.4 Digital Radio
机译:
802.15.4数字无线电中的幻像边界和跨层幻觉
作者:
Goodspeed T.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Zigbee;
error correction;
protocols;
telecommunication security;
IEEE 802.15.4 digital radio;
PDU;
PHY layer logic;
SDU;
WOOT 2011;
cross-layer illusions;
error correction;
input language manipulation attacks;
language-theoretic considerations;
low-level chip encoding;
packet-in-packet attack;
phantom boundaries;
protocol data units;
protocol stacks;
service data units;
Automata;
Error correction codes;
IEEE 802.15 Standards;
Noise;
Protocols;
Receivers;
Security;
802.15.4;
LangSec;
Packet-in-packet;
34.
The Weird Machines in Proof-Carrying Code
机译:
证明代码中的奇怪机器
作者:
Vanegue J.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
codes;
security of data;
PCC systems;
formal system;
machine abstraction;
memory attacks;
memory model;
proof-carrying code;
untrusted computations;
weird machines;
Abstracts;
Computational modeling;
Program processors;
Registers;
Safety;
Security;
Semantics;
FPCC;
Machines;
PCC;
Weird;
35.
Using Existing Hardware Services for Malware Detection
机译:
使用现有的硬件服务进行恶意软件检测
作者:
Kompalli S.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
invasive software;
defense-in-depth security model;
hardware-aided proof-carrying code;
hardware-based metrics;
input validation;
malware activity detection;
Hardware;
IP networks;
Malware;
Monitoring;
Software;
System-on-chip;
data security;
malware;
security in hardware;
36.
Finite State Machine Parsing for Internet Protocols: Faster Than You Think
机译:
Internet协议的有限状态机解析:比您想象的要快
作者:
Graham R.D.
;
Johnson P.C.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Internet;
finite state machines;
protocols;
FSM;
Internet protocols;
L1 cache hit latency;
branch misprediction penalty;
finite state machine parsing;
program-wide memory overhead;
protocol implementations;
protocol specifications;
Automata;
Internet;
Pipelines;
Program processors;
Protocols;
Servers;
Switches;
37.
LEGO(TM) Bricks for Reactive Programming
机译:
用于反应式编程的LEGO(TM)积木
作者:
Volpano D.
会议名称:
《IEEE Security and Privacy Workshops》
|
2014年
关键词:
Java;
authoring languages;
data flow computing;
deterministic automata;
finite automata;
trusted computing;
JavaScript;
LEGO bricks;
deterministic finite automata;
product construction;
reactive programming;
trustworthy reactive program;
Adders;
Automata;
Browsers;
Delays;
Keyboards;
Mice;
Programming;
programming methodology;
38.
Grammatical Inference and Language Frameworks for LANGSEC
机译:
Langsec的语法推理和语言框架
作者:
Wood Kerry N.
;
Harang Richard E.
会议名称:
《IEEE Security and Privacy Workshops》
|
2015年
关键词:
LANGSEC;
elementary formal system (EFS);
grammatical inference;
language identification;
pattern language;
39.
Verification State-Space Reduction through Restricted Parsing Environments
机译:
通过受限制的解析环境验证状态空间减少
作者:
Torrey Jacob /I/.
;
Bridgman Mark P.
会议名称:
《IEEE Security and Privacy Workshops》
|
2015年
关键词:
LLVM;
LangSec;
Walther recursion;
language-theoretic security;
parsing;
programming languages;
qmail;
verification;
40.
ConPro Committees
机译:
委员会委员会
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
41.
Introduction to BioStar
机译:
BioStar介绍
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
42.
Introduction to MoST
机译:
介绍最多
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
43.
Introduction to IWPE
机译:
IWPE介绍
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
44.
Introduction to WTMC
机译:
WTMC介绍
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
45.
MoSt Committees
机译:
大多数委员会
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
46.
LangSec Committees
机译:
Langsec委员会
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
47.
Introduction to LangSec
机译:
Langsec介绍
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
48.
BioStar Committees
机译:
生物极具委员会
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
49.
Introduction to ConPro
机译:
COTRO介绍
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
50.
Message from the SPW 2017 General Chair
机译:
来自SPW 2017普通主席的消息
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
51.
IWPE Committees
机译:
IWPE委员会
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
52.
Summary from the IWPE 2017 Chairs
机译:
IWPE 2017椅子的摘要
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
53.
WTMC Committees
机译:
WTMC委员会
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
54.
IDE Plugins for Detecting Input-Validation Vulnerabilities
机译:
用于检测输入验证漏洞的IDE插件
作者:
Aniqua Z. Baset
;
Tamara Denning
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Androids;
Humanoid robots;
Java;
Tools;
Documentation;
55.
Ethics and Internet Measurements
机译:
道德和互联网测量
作者:
Jeroen van der Ham
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Ethics;
Internet;
Public transportation;
Facebook;
Censorship;
Guidelines;
Computer security;
56.
Research Report: Hardware-Enforcement of Walther-Recursive Program Functions
机译:
研究报告:Walther-Revursive计划功能的硬件执行
作者:
Jacob I. Torrey
;
Mark P. Bridgman
;
Tomasz Tuzel
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Security;
Semantics;
Engines;
Monitoring;
Programming;
Complexity theory;
Program processors;
57.
Using Evolutionary Diversity to Identify Problematic Software Parameters
机译:
使用进化的多样性来识别有问题的软件参数
作者:
Errin W. Fulp
;
H. Donald Gage
;
Matthew R. McNiece
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Security;
Biological cells;
Evolutionary computation;
Guidelines;
Complexity theory;
Operating systems;
58.
Don’t You Touch My Nuts: Information Hiding in Cyber Physical Systems
机译:
难道你不碰我的坚果:隐藏在网络物理系统中的信息
作者:
Steffen Wendzel
;
Wojciech Mazurczyk
;
Georg Haas
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Registers;
Actuators;
Temperature sensors;
Smart buildings;
Protocols;
59.
Effects of Shared Bandwidth on Anonymity of the I2P Network Users
机译:
共享带宽对I2P网络用户匿名性的影响
作者:
Khalid Shahbar
;
A. Nur Zincir-Heywood
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Bandwidth;
Monitoring;
Machine learning algorithms;
Relays;
Peer-to-peer computing;
IP networks;
Classification algorithms;
60.
Ant Colony-Inspired Parallel Algorithm to Improve Cryptographic Pseudo Random Number Generators
机译:
蚂蚁殖民地启发的并行算法改进加密伪随机数发生器
作者:
J?rg Keller
;
Gabriele Spenger
;
Steffen Wendzel
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Parallel algorithms;
Cryptography;
Generators;
Runtime;
Memory management;
Data structures;
61.
Seamless In-App Ad Blocking on Stock Android
机译:
无缝的应用程序广告封锁股票android
作者:
Michael Backes
;
Sven Bugiel
;
Philipp von Styp-Rekowsky
;
Marvin Wi?feld
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Libraries;
Androids;
Humanoid robots;
Robustness;
Security;
Virtualization;
Browsers;
62.
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications
机译:
Spartan Jester:用于混合动力系统的端到端信息流量控制
作者:
Julian Sexton
;
Andrey Chudnov
;
David A. Naumann
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Androids;
Humanoid robots;
Java;
Security;
Tools;
Monitoring;
Lattices;
63.
Using Gaussian Mixture Models to Detect Outliers in Seasonal Univariate Network Traffic
机译:
使用高斯混合模型来检测季节性单变量网络流量的异常值
作者:
Aarthi Reddy
;
Meredith Ordway-West
;
Melissa Lee
;
Matt Dugan
;
Joshua Whitney
;
Ronen Kahana
;
Brad Ford
;
Johan Muedsam
;
Austin Henslee
;
Max Rao
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Time series analysis;
Anomaly detection;
Probability density function;
Gaussian mixture model;
Clustering algorithms;
Algorithm design and analysis;
64.
Evolutionary Approaches for Resilient Surveillance Management
机译:
有弹性监视管理的进化方法
作者:
Ruidan Li
;
Errin W. Fulp
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Cameras;
Surveillance;
Biological cells;
Search problems;
Security;
Art;
Evolutionary computation;
65.
An Investigation of Power Law Probability Distributions for Network Anomaly Detection
机译:
网络异常检测权力法概率分布研究
作者:
Stefan Prandl
;
Mihai Lazarescu
;
Duc Son Pham
;
Sie Teng Soh
;
Subhash Kak
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Games;
Probability distribution;
Anomaly detection;
Servers;
Security;
Time-frequency analysis;
66.
Traffic Monitoring and Diagnosis with Multivariate Statistical Network Monitoring: A Case Study
机译:
多元统计网络监测的交通监测与诊断:案例研究
作者:
José Camacho
;
Pedro García-Teodoro
;
Gabriel Maciá-Fernández
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Principal component analysis;
Anomaly detection;
Monitoring;
Feature extraction;
Ports (Computers);
Security;
Support vector machines;
67.
Malware Detection by Analysing Network Traffic with Neural Networks
机译:
利用神经网络分析网络流量的恶意软件检测
作者:
Paul Prasse
;
Luká? Machlica
;
Tomá? Pevny
;
Ji?í Havelka
;
Tobias Scheffer
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Malware;
Cryptography;
Tools;
Protocols;
Servers;
Virtual private networks;
68.
Guiding a Colony of Black-Box Fuzzers with Chemotaxis
机译:
用趋化性引导黑匣子模糊的殖民地
作者:
Konstantin B?ttinger
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Force;
Instruments;
Computer bugs;
Biological information theory;
69.
Attack-Resistant aiCAPTCHA Using a Negative Selection Artificial Immune System
机译:
使用负面选择人工免疫系统进行攻击AICAPTCHA
作者:
Brian M. Powell
;
Ekampreet Kalsy
;
Gaurav Goswami
;
Mayank Vatsa
;
Richa Singh
;
Afzel Noore
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
CAPTCHAs;
Immune system;
Computers;
Object recognition;
Image color analysis;
Security;
Distortion;
70.
Real Time Network File Similarity Detection Based on Approximate Matching
机译:
基于近似匹配的实时网络文件相似性检测
作者:
Aonan Zhai
;
Fei Xu
;
Zigang Cao
;
Haiqing Pan
;
Zhen Li
;
Gang Xiong
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Matched filters;
Databases;
Filtering algorithms;
Entropy;
Real-time systems;
Approximation algorithms;
Telecommunication traffic;
71.
Security Implications of Publicly Reachable Building Automation Systems
机译:
公开楼宇自动化系统的安全影响
作者:
Oliver Gasser
;
Quirin Scheitle
;
Carl Denis
;
Nadja Schricker
;
Georg Carle
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Payloads;
Ports (Computers);
Protocols;
Security;
IP networks;
72.
Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization
机译:
通过符号优化可扩展安全多方网络漏洞分析
作者:
Kinan Dak Albab
;
Rawane Issa
;
Andrei Lapets
;
Azer Bestavros
;
Nikolaj Volgushev
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Logic gates;
Optimization;
Network topology;
Topology;
Security;
Measurement;
Risk management;
73.
Building Hardened Internet-of-Things Clients with Language-Theoretic Security
机译:
用语言理论安全构建硬化的互联网客户
作者:
Prashant Anantharaman
;
Michael Locasto
;
Gabriela F. Ciocarlie
;
Ulf Lindqvist
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Protocols;
Servers;
Grammar;
Buildings;
Internet;
Authentication;
74.
Inference of Security-Sensitive Entities in Libraries
机译:
图书馆中的安全敏感实体推断
作者:
Yi Lu
;
Sora Bae
;
Padmanabhan Krishnan
;
K. R. Raghavendra
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Java;
Access control;
Libraries;
Guidelines;
Semantics;
Inference algorithms;
75.
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars
机译:
通过从无内容语法中推导自动编码器和解码器来消除基于输入的攻击
作者:
Tobias Bieschke
;
Lars Hermerschmidt
;
Bernhard Rumpe
;
Peter Stanchev
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Grammar;
Encoding;
Generators;
Nails;
Protocols;
76.
Biometric Authentication Using Mouse and Eye Movement Data
机译:
使用鼠标和眼睛移动数据的生物识别认证
作者:
Jamison Rose
;
Yudong Liu
;
Ahmed Awad
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Mice;
Feature extraction;
Authentication;
Data mining;
Training;
Hardware;
Physiology;
77.
On the Personalization of Trust Management
机译:
论信托管理的个性化
作者:
Hisham Salah
;
Mohamed Eltoweissy
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Systems architecture;
Computational modeling;
Peer-to-peer computing;
Web services;
Monitoring;
Computer architecture;
Quality of service;
78.
Mobile Subscriber WiFi Privacy
机译:
移动订阅者WiFi隐私
作者:
Piers O’Hanlon
;
Ravishankar Borgaonkar
;
Lucca Hirschi
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Protocols;
Wireless fidelity;
Authentication;
Mobile communication;
Privacy;
Mobile computing;
79.
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
机译:
环境传感器的适用性作为NFC交易的邻近证据
作者:
Carlton Shepherd
;
Iakovos Gurulian
;
Eibe Frank
;
Konstantinos Markantonakis
;
Raja Naeem Akram
;
Emmanouil Panaousis
;
Keith Mayes
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Relays;
Mobile communication;
Smart phones;
Smart cards;
Intelligent sensors;
80.
A Framework for Validating Session Protocols
机译:
用于验证会话协议的框架
作者:
Kit Sum Tse
;
Peter C. Johnson
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Protocols;
Data structures;
Security;
Testing;
DSL;
Semantics;
81.
Towards a Biometric Authentication-Based Hybrid Trust-Computing Approach for Verification of Provider Profiles in Online Healthcare Information
机译:
朝着基于生物认证的混合信任计算方法,用于验证在线医疗信息中的提供商配置文件
作者:
Ankur Chattopadhyay
;
Michael J. Schulz
;
Clinton Rettler
;
Katie Turkiewicz
;
Laleah Fernandez
;
Askar Ziganshin
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Internet;
Visualization;
Biological system modeling;
Authentication;
Prototypes;
Medical conditions;
82.
HybridGuard: A Principal-Based Permission and Fine-Grained Policy Enforcement Framework for Web-Based Mobile Applications
机译:
HybridGuard:基于主要的许可和基于Web的移动应用程序的细粒度策略执法框架
作者:
Phu H. Phung
;
Abhinav Mohanty
;
Rahul Rachapalli
;
Meera Sridhar
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Mobile communication;
Security;
Bridges;
Whitelist;
Mobile applications;
Business;
Browsers;
83.
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
机译:
MR-DROID:对应用间通信风险的可扩展和优先考虑分析
作者:
Fang Liu
;
Haipeng Cai
;
Gang Wang
;
Danfeng Yao
;
Karim O. Elish
;
Barbara G. Ryder
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Security;
Androids;
Humanoid robots;
Feature extraction;
Computer science;
Mobile communication;
Scalability;
84.
Lua Code: Security Overview and Practical Approaches to Static Analysis
机译:
Lua代码:安全概述和静态分析的实用方法
作者:
Andrei Costin
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Malware;
Tools;
Security;
Open source software;
Organizations;
Internet;
85.
Writing Parsers Like it is 2017
机译:
像它一样写作是2017年
作者:
Pierre Chifflier
;
Geoffroy Couprie
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Computer bugs;
Security;
Software;
Computer languages;
Memory management;
Libraries;
Safety;
86.
Taming the Length Field in Binary Data: Calc-Regular Languages
机译:
驯服二进制数据中的长度字段:Calc-Reguent语言
作者:
Stefan Lucks
;
Norina Marie Grosch
;
Joshua K?nig
会议名称:
《IEEE Security and Privacy Workshops》
|
2017年
关键词:
Security;
Receivers;
Computer languages;
Computer bugs;
Heart beat;
Encoding;
87.
Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
机译:
导航内幕威胁工具景观:跳跃的低成本技术解决方案启动内幕威胁计划
作者:
Derrick Spooner
;
George Silowash
;
Daniel Costa
;
Michael Albrethsen
会议名称:
《IEEE Security and Privacy Workshops》
|
2018年
关键词:
Tools;
Organizations;
Monitoring;
Software;
Security;
Law;
88.
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics
机译:
评估数字取证的自动面值估计技术
作者:
Felix Anda
;
David Lillis
;
Nhien-An Le-Khac
;
Mark Scanlon
会议名称:
《IEEE Security and Privacy Workshops》
|
2018年
关键词:
Estimation;
Digital forensics;
Face recognition;
Face;
Task analysis;
Security;
Law enforcement;
89.
Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account
机译:
沉浸式虚拟现实社会应用的法医分析:主要账户
作者:
Ananya Yarramreddy
;
Peter Gromkowski
;
Ibrahim Baggili
会议名称:
《IEEE Security and Privacy Workshops》
|
2018年
关键词:
Forensics;
Facebook;
Games;
Security;
Monitoring;
Testing;
Avatars;
90.
Detection of Masqueraders Based on Graph Partitioning of File System Access Events
机译:
基于文件系统访问事件的图分隔检测伪装体
作者:
Flavio Toffalini
;
Ivan Homoliak
;
Athul Harilal
;
Alexander Binder
;
Martin Ochoa
会议名称:
《IEEE Security and Privacy Workshops》
|
2018年
关键词:
Security;
Privacy;
Conferences;
Licenses;
91.
Forensic-Aware Anti-DDoS Device
机译:
法医意识的防DDOS设备
作者:
Chi Yuen Tseung
;
Kam Pui Chow
会议名称:
《IEEE Security and Privacy Workshops》
|
2018年
关键词:
Feature extraction;
Buffer storage;
Computer crime;
Forensics;
Machine learning algorithms;
Filtering algorithms;
Machine learning;
92.
Message from the General Chair
机译:
一般椅子的信息
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
93.
Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection
机译:
从上下文中学习:用于恶意软件检测的多视图深度学习架构
作者:
Adarsh Kyadige
;
Ethan M. Rudd
;
Konstantin Berlin
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Analytical models;
Visualization;
Neural networks;
Detectors;
Malware;
Security;
Context modeling;
94.
Attributing and Detecting Fake Images Generated by Known GANs
机译:
归因和检测已知导致生成的假图像
作者:
Matthew Joslin
;
Shuang Hao
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Measurement;
Training;
Analytical models;
Visualization;
Frequency-domain analysis;
Transform coding;
Gallium nitride;
95.
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach
机译:
检测非英国黑客论坛中的网络威胁:对抗跨语言知识转移方法
作者:
Mohammadreza Ebrahimi
;
Sagar Samtani
;
Yidong Chai
;
Hsinchun Chen
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Knowledge engineering;
Privacy;
Machine learning algorithms;
Computer hacking;
Semantics;
Generative adversarial networks;
Knowledge transfer;
96.
RTA3: A Real Time Adversarial Attack on Recurrent Neural Networks
机译:
RTA3:对经常性神经网络的实时对抗攻击
作者:
Christopher R. Serrano
;
Pape Sylla
;
Sicun Gao
;
Michael A. Warren
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Recurrent neural networks;
Perturbation methods;
Time series analysis;
Reinforcement learning;
Transforms;
Streaming media;
Real-time systems;
97.
Minimum-Norm Adversarial Examples on KNN and KNN based Models
机译:
基于KNN和KNN模型的最小规范对抗例
作者:
Chawin Sitawarin
;
David Wagner
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Data privacy;
Conferences;
Computational modeling;
Neural networks;
Robustness;
Security;
98.
Case Study: Safety Verification of an Unmanned Underwater Vehicle
机译:
案例研究:无人水下车辆的安全验证
作者:
Diego Manzanas Lopez
;
Patrick Musau
;
Nathaniel Hamilton
;
Hoang-Dung Tran
;
Taylor T. Jonhson
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Artificial neural networks;
Cyber-physical systems;
Unmanned underwater vehicles;
Safety;
Computational efficiency;
Reachability analysis;
Collision avoidance;
99.
Backdooring and Poisoning Neural Networks with Image-Scaling Attacks
机译:
带图像缩放攻击的回理和中毒神经网络
作者:
Erwin Quiring
;
Konrad Rieck
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Privacy;
Image resolution;
Machine vision;
Conferences;
Neural networks;
Machine learning;
Security;
100.
SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems
机译:
Sentinet:检测对深度学习系统的局部普遍攻击
作者:
Edward Chou
;
Florian Tramèr
;
Giancarlo Pellegrino
会议名称:
《IEEE Security and Privacy Workshops》
|
2020年
关键词:
Training;
Privacy;
Neural networks;
Object detection;
Robustness;
Security;
Testing;
意见反馈
回到顶部
回到首页