![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/iccns/iccns2018.bht:"
@inproceedings{DBLP:conf/iccns/0002JMY18, author = {Xiaoming Hu and Wenrong Jiang and Chuang Ma and Chengcheng Yu}, title = {Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {12--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290487}, doi = {10.1145/3290480.3290487}, timestamp = {Thu, 22 Apr 2021 18:47:33 +0200}, biburl = {https://dblp.org/rec/conf/iccns/0002JMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BaiZZHZH18, author = {Xiaodong Bai and Wendeng Zhu and Gengxin Zhang and Tao Hong and Laiding Zhao and Jing Hu}, title = {Identification Method of Power Spectral Signal Based on Fourier Series Fitting and Density Clustering}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {107--111}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290495}, doi = {10.1145/3290480.3290495}, timestamp = {Wed, 29 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/BaiZZHZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenWZL18, author = {Yunfang Chen and Que Wu and Wei Zhang and Qiangchun Liu}, title = {{SD-WAN} Source Route Based on Protocol-oblivious Forwarding}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {95--99}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290486}, doi = {10.1145/3290480.3290486}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/ChenWZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ChenXDLL18, author = {Xiong Chen and Ruliang Xiao and Xin Du and Xinhong Lin and Li Lin}, title = {Constructing {A} Novel Spark-based Distributed Maximum Frequent Sequence Pattern Mining for IoT Log}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {112--116}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290497}, doi = {10.1145/3290480.3290497}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ChenXDLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/GuHW18, author = {Yonggen Gu and Dingding Hou and Xiaohong Wu}, title = {A Cloud Storage Resource Transaction Mechanism Based on Smart Contract}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {134--138}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290499}, doi = {10.1145/3290480.3290499}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/GuHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Haghighat018, author = {Mohammad Hashem Haghighat and Jun Li}, title = {Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {1--6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290484}, doi = {10.1145/3290480.3290484}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Haghighat018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/JiangXT18, author = {Yikun Jiang and Wei Xie and Yong Tang}, title = {Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {56--63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290491}, doi = {10.1145/3290480.3290491}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/JiangXT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/KongHZY18, author = {Lingjing Kong and Guowei Huang and Ying Zhou and Jianfeng Ye}, title = {Fast Abnormal Identification for Large Scale Internet Traffic}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {117--120}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290498}, doi = {10.1145/3290480.3290498}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/KongHZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiZQ18, author = {Shijin Li and Minchen Zhu and Yanbin Qiu}, title = {Attack Intent Analysis Method Based on Attack Path Graph}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {27--31}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290502}, doi = {10.1145/3290480.3290502}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiZQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LiuDL18, author = {Xiaojian Liu and Xiaofeng Dong and Qian Lei}, title = {Android Malware Detection Based on Multi-Features}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {69--73}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290493}, doi = {10.1145/3290480.3290493}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LiuDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Man0L18, author = {Dapeng Man and Wu Yang and Zeya Lu}, title = {Research on Task Scheduling Model for Multi-core Processor}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {129--133}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290483}, doi = {10.1145/3290480.3290483}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Man0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Man0T18, author = {Dapeng Man and Wu Yang and Guoqing Tian}, title = {Multi-pattern Matching Algorithm based on Variable Step Size}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {125--128}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290482}, doi = {10.1145/3290480.3290482}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Man0T18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/QiuLL18, author = {Yanbin Qiu and Yanhua Liu and Shijin Li}, title = {A method of cyber risk control node selection based on Game Theory}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {32--36}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290504}, doi = {10.1145/3290480.3290504}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/QiuLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Seghier18, author = {Athmane Seghier}, title = {Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {50--55}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290490}, doi = {10.1145/3290480.3290490}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Seghier18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShenGW18, author = {Shiyu Shen and Jianlin Gao and Aitian Wu}, title = {Weakness Identification and Flow Analysis Based on Tor Network}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {90--94}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290481}, doi = {10.1145/3290480.3290481}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ShenGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SuLS18, author = {Peihuang Su and Yanhua Liu and Xiang Song}, title = {Research on Intrusion Detection Method Based on Improved Smote and XGBoost}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {37--41}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290505}, doi = {10.1145/3290480.3290505}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SuLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SunH18, author = {Haonan Sun and Rongyu He}, title = {Certification and remote attestation methods of the eTPM trusted cloud}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {42--49}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290488}, doi = {10.1145/3290480.3290488}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SunH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/SunLH18, author = {Gangcan Sun and Mengge Liu and Zhuo Han}, title = {Multiple Eavesdropper-Based Physical Layer Security in {TAS/MRC} System With Antenna Correlation}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {100--106}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290489}, doi = {10.1145/3290480.3290489}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/SunLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangCH18, author = {Yongchao Wang and Yuyan Chao and Lifeng He}, title = {A Study of Neighbor Users Selection in Email Networks for Spam Filtering}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {22--26}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290500}, doi = {10.1145/3290480.3290500}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZW18, author = {Chuanchuan Wang and Yonghu Zeng and Liandong Wang}, title = {A Modified Source Number Estimation Method based on Wavelet Analysis and Singular Value Decomposition}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {121--124}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290509}, doi = {10.1145/3290480.3290509}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WangZW18a, author = {Chuanchuan Wang and Yonghu Zeng and Liandong Wang}, title = {Mixing Matrix Estimation Method for {UBSS} based on Observed Data Segmentation}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {149--154}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290510}, doi = {10.1145/3290480.3290510}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/WangZW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/WuSYL18, author = {Cangshuai Wu and Jiangyong Shi and Yuexiang Yang and Wenhua Li}, title = {Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {74--78}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290494}, doi = {10.1145/3290480.3290494}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/WuSYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/XiongXZ18, author = {Xinli Xiong and Weiguang Xu and Guangsheng Zhao}, title = {The Effectiveness Assessment for Network Based {MTD} Strategies}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {7--11}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290485}, doi = {10.1145/3290480.3290485}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/XiongXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangMZ18, author = {Wei{-}Guo Zhang and Xi{-}Lin Ma and Jin{-}Zhong Zhang}, title = {Research on Kubernetes' Resource Scheduling Scheme}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {144--148}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290507}, doi = {10.1145/3290480.3290507}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangWZHL18, author = {Yuxuan Zhang and Jianghong Wei and Xiaojian Zhang and Xuexian Hu and Wenfen Liu}, title = {A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {84--89}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290503}, doi = {10.1145/3290480.3290503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangWZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZHL18, author = {Mengli Zhang and Qihui Zhang and Xuexian Hu and Wenfen Liu}, title = {A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {79--83}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290501}, doi = {10.1145/3290480.3290501}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZLHL18, author = {Xu Zhang and Shaowu Zhou and Peng Lin and Wei Huang and Wendu Li}, title = {Stability Analysis of Tail Water Slope out of the Underground Power Station in Hydropower Engineering}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {155--159}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290508}, doi = {10.1145/3290480.3290508}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZLHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Zhao18, author = {Jianfeng Zhao}, title = {Case Study: Discovering Hardware Trojans Based on model checking}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {64--68}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290492}, doi = {10.1145/3290480.3290492}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Zhao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhaoXW18, author = {Guangsheng Zhao and Xinli Xiong and Huaying Wu}, title = {A Model for Analyzing the Effectiveness of Moving Target Defense}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {17--21}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290496}, doi = {10.1145/3290480.3290496}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhaoXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhengYC18, author = {Shengshi Zheng and Xuerong Yue and Zhibin Chen}, title = {Parallel Machine Scheduling with Rejection under Special Conditions}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {139--143}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290506}, doi = {10.1145/3290480.3290506}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhengYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccns/2018, title = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480}, doi = {10.1145/3290480}, isbn = {978-1-4503-6567-3}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.