Search dblp for Publications

export results for "toc:db/conf/iccns/iccns2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccns/0002JMY18,
  author       = {Xiaoming Hu and
                  Wenrong Jiang and
                  Chuang Ma and
                  Chengcheng Yu},
  title        = {Security Analysis and Improvement of Partially Blind Proxy Re-signature
                  Scheme},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {12--16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290487},
  doi          = {10.1145/3290480.3290487},
  timestamp    = {Thu, 22 Apr 2021 18:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/0002JMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BaiZZHZH18,
  author       = {Xiaodong Bai and
                  Wendeng Zhu and
                  Gengxin Zhang and
                  Tao Hong and
                  Laiding Zhao and
                  Jing Hu},
  title        = {Identification Method of Power Spectral Signal Based on Fourier Series
                  Fitting and Density Clustering},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {107--111},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290495},
  doi          = {10.1145/3290480.3290495},
  timestamp    = {Wed, 29 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/BaiZZHZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenWZL18,
  author       = {Yunfang Chen and
                  Que Wu and
                  Wei Zhang and
                  Qiangchun Liu},
  title        = {{SD-WAN} Source Route Based on Protocol-oblivious Forwarding},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {95--99},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290486},
  doi          = {10.1145/3290480.3290486},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenXDLL18,
  author       = {Xiong Chen and
                  Ruliang Xiao and
                  Xin Du and
                  Xinhong Lin and
                  Li Lin},
  title        = {Constructing {A} Novel Spark-based Distributed Maximum Frequent Sequence
                  Pattern Mining for IoT Log},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {112--116},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290497},
  doi          = {10.1145/3290480.3290497},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenXDLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuHW18,
  author       = {Yonggen Gu and
                  Dingding Hou and
                  Xiaohong Wu},
  title        = {A Cloud Storage Resource Transaction Mechanism Based on Smart Contract},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {134--138},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290499},
  doi          = {10.1145/3290480.3290499},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Haghighat018,
  author       = {Mohammad Hashem Haghighat and
                  Jun Li},
  title        = {Edmund: Entropy based attack Detection and Mitigation engine Using
                  Netflow Data},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290484},
  doi          = {10.1145/3290480.3290484},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Haghighat018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/JiangXT18,
  author       = {Yikun Jiang and
                  Wei Xie and
                  Yong Tang},
  title        = {Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded
                  Web Servers},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {56--63},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290491},
  doi          = {10.1145/3290480.3290491},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/JiangXT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KongHZY18,
  author       = {Lingjing Kong and
                  Guowei Huang and
                  Ying Zhou and
                  Jianfeng Ye},
  title        = {Fast Abnormal Identification for Large Scale Internet Traffic},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {117--120},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290498},
  doi          = {10.1145/3290480.3290498},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KongHZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiZQ18,
  author       = {Shijin Li and
                  Minchen Zhu and
                  Yanbin Qiu},
  title        = {Attack Intent Analysis Method Based on Attack Path Graph},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {27--31},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290502},
  doi          = {10.1145/3290480.3290502},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiZQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuDL18,
  author       = {Xiaojian Liu and
                  Xiaofeng Dong and
                  Qian Lei},
  title        = {Android Malware Detection Based on Multi-Features},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {69--73},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290493},
  doi          = {10.1145/3290480.3290493},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Man0L18,
  author       = {Dapeng Man and
                  Wu Yang and
                  Zeya Lu},
  title        = {Research on Task Scheduling Model for Multi-core Processor},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {129--133},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290483},
  doi          = {10.1145/3290480.3290483},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Man0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Man0T18,
  author       = {Dapeng Man and
                  Wu Yang and
                  Guoqing Tian},
  title        = {Multi-pattern Matching Algorithm based on Variable Step Size},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {125--128},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290482},
  doi          = {10.1145/3290480.3290482},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Man0T18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/QiuLL18,
  author       = {Yanbin Qiu and
                  Yanhua Liu and
                  Shijin Li},
  title        = {A method of cyber risk control node selection based on Game Theory},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {32--36},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290504},
  doi          = {10.1145/3290480.3290504},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/QiuLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Seghier18,
  author       = {Athmane Seghier},
  title        = {Progressive Two-bits Tweak for Linear Redundancy reduction from Finite
                  Field S-Boxes},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {50--55},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290490},
  doi          = {10.1145/3290480.3290490},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Seghier18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShenGW18,
  author       = {Shiyu Shen and
                  Jianlin Gao and
                  Aitian Wu},
  title        = {Weakness Identification and Flow Analysis Based on Tor Network},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {90--94},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290481},
  doi          = {10.1145/3290480.3290481},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ShenGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SuLS18,
  author       = {Peihuang Su and
                  Yanhua Liu and
                  Xiang Song},
  title        = {Research on Intrusion Detection Method Based on Improved Smote and
                  XGBoost},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {37--41},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290505},
  doi          = {10.1145/3290480.3290505},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SuLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SunH18,
  author       = {Haonan Sun and
                  Rongyu He},
  title        = {Certification and remote attestation methods of the eTPM trusted cloud},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {42--49},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290488},
  doi          = {10.1145/3290480.3290488},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SunH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SunLH18,
  author       = {Gangcan Sun and
                  Mengge Liu and
                  Zhuo Han},
  title        = {Multiple Eavesdropper-Based Physical Layer Security in {TAS/MRC} System
                  With Antenna Correlation},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {100--106},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290489},
  doi          = {10.1145/3290480.3290489},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SunLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangCH18,
  author       = {Yongchao Wang and
                  Yuyan Chao and
                  Lifeng He},
  title        = {A Study of Neighbor Users Selection in Email Networks for Spam Filtering},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {22--26},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290500},
  doi          = {10.1145/3290480.3290500},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZW18,
  author       = {Chuanchuan Wang and
                  Yonghu Zeng and
                  Liandong Wang},
  title        = {A Modified Source Number Estimation Method based on Wavelet Analysis
                  and Singular Value Decomposition},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {121--124},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290509},
  doi          = {10.1145/3290480.3290509},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZW18a,
  author       = {Chuanchuan Wang and
                  Yonghu Zeng and
                  Liandong Wang},
  title        = {Mixing Matrix Estimation Method for {UBSS} based on Observed Data
                  Segmentation},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {149--154},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290510},
  doi          = {10.1145/3290480.3290510},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuSYL18,
  author       = {Cangshuai Wu and
                  Jiangyong Shi and
                  Yuexiang Yang and
                  Wenhua Li},
  title        = {Enhancing Machine Learning Based Malware Detection Model by Reinforcement
                  Learning},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {74--78},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290494},
  doi          = {10.1145/3290480.3290494},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/WuSYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XiongXZ18,
  author       = {Xinli Xiong and
                  Weiguang Xu and
                  Guangsheng Zhao},
  title        = {The Effectiveness Assessment for Network Based {MTD} Strategies},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {7--11},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290485},
  doi          = {10.1145/3290480.3290485},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XiongXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangMZ18,
  author       = {Wei{-}Guo Zhang and
                  Xi{-}Lin Ma and
                  Jin{-}Zhong Zhang},
  title        = {Research on Kubernetes' Resource Scheduling Scheme},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {144--148},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290507},
  doi          = {10.1145/3290480.3290507},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangWZHL18,
  author       = {Yuxuan Zhang and
                  Jianghong Wei and
                  Xiaojian Zhang and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential
                  Privacy},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {84--89},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290503},
  doi          = {10.1145/3290480.3290503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangWZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZHL18,
  author       = {Mengli Zhang and
                  Qihui Zhang and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {A Password Cracking Method Based On Structure Partition and BiLSTM
                  Recurrent Neural Network},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {79--83},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290501},
  doi          = {10.1145/3290480.3290501},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZLHL18,
  author       = {Xu Zhang and
                  Shaowu Zhou and
                  Peng Lin and
                  Wei Huang and
                  Wendu Li},
  title        = {Stability Analysis of Tail Water Slope out of the Underground Power
                  Station in Hydropower Engineering},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {155--159},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290508},
  doi          = {10.1145/3290480.3290508},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZLHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Zhao18,
  author       = {Jianfeng Zhao},
  title        = {Case Study: Discovering Hardware Trojans Based on model checking},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {64--68},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290492},
  doi          = {10.1145/3290480.3290492},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Zhao18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhaoXW18,
  author       = {Guangsheng Zhao and
                  Xinli Xiong and
                  Huaying Wu},
  title        = {A Model for Analyzing the Effectiveness of Moving Target Defense},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {17--21},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290496},
  doi          = {10.1145/3290480.3290496},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhaoXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengYC18,
  author       = {Shengshi Zheng and
                  Xuerong Yue and
                  Zhibin Chen},
  title        = {Parallel Machine Scheduling with Rejection under Special Conditions},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {139--143},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290506},
  doi          = {10.1145/3290480.3290506},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2018,
  title        = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480},
  doi          = {10.1145/3290480},
  isbn         = {978-1-4503-6567-3},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics