NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 130
1.
  • A computational approach fo... A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis
    Jang, S. Mo; Geng, Tieming; Queenie Li, Jo-Yun ... Computers in human behavior, July 2018, 2018-07-00, 20180701, Letnik: 84
    Journal Article
    Recenzirano

    To improve the flow of quality information and combat fake news on social media, it is essential to identify the origins and evolution patterns of false information. However, scholarship dedicated to ...
Celotno besedilo
2.
  • Maximizing accuracy in mult... Maximizing accuracy in multi-scanner malware detection systems
    Sakib, Muhammad N.; Huang, Chin-Tser; Lin, Ying-Dar Computer networks (Amsterdam, Netherlands : 1999), 03/2020, Letnik: 169
    Journal Article
    Recenzirano

    A variety of anti-malware scanners have been developed for malware detection. Previous research has indicated that combining multiple different scanners can achieve better result compared to any ...
Celotno besedilo
3.
  • A SYN flooding attack detec... A SYN flooding attack detection approach with hierarchical policies based on self‐information
    Sun, Jia‐Rong; Huang, Chin‐Tser; Hwang, Min‐Shiang ETRI journal, April 2022, 2022-04-00, Letnik: 44, Številka: 2
    Journal Article
    Recenzirano

    The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self‐information approach ...
Celotno besedilo

PDF
4.
  • Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement
    Venkateswaran, Venkat; Huang, Chin-Tser; Ravindran, Kaliappa 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2023-Jan.-3
    Conference Proceeding

    We present a security management strategy of cyber-deception to protect the content-data cache sites of a Content Distribution Network. The design goal is to reduce the variance between client ...
Celotno besedilo
5.
  • Safety Assessment of CACC Vehicles with Faulty Sensors Using SUMO Simulations
    Krishnamurthy, Mohit; Huang, Chin-Tser SoutheastCon 2022, 2022-March-26
    Conference Proceeding

    Cooperative Adaptive Cruise Control (CACC) provides benefits of increasing roadway capacity and reducing energy consumption, but it can cause safety problems if a CACC vehicle has a faulty sensor ...
Celotno besedilo
6.
  • Delegated Proof of Secret S... Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment
    Geng, Tieming; Njilla, Laurent; Huang, Chin-Tser Network, 03/2022, Letnik: 2, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    With the rapid advancement and wide application of blockchain technology, blockchain consensus protocols, which are the core part of blockchain systems, along with the privacy issues, have drawn much ...
Celotno besedilo

PDF
7.
  • Resilient User-Side Android... Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs
    Zeng, Qiang; Luo, Lannan; Qian, Zhiyun ... IEEE transactions on dependable and secure computing, 11/2021, Letnik: 18, Številka: 6
    Journal Article

    Application repackaging is a severe threat to Android users and the market. Not only does it infringe on intellectual property, but it is also one of the most common ways of propagating mobile ...
Celotno besedilo
8.
  • Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain
    Liu, Jian; Huang, Chin-Tser 2021 International Conference on Computer Communications and Networks (ICCCN), 2021-July
    Conference Proceeding

    The global coronavirus pandemic is reshaping our daily lives and has forced many people to work and socialize remotely. This trend also increases the demand for highly available and trustworthy ...
Celotno besedilo
9.
  • A moving-target defense str... A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces
    Wei Peng; Feng Li; Chin-Tser Huang ... 2014 IEEE International Conference on Communications (ICC), 2014-June
    Conference Proceeding

    Due to deep automation, the configuration of many Cloud infrastructures is static and homogeneous, which, while easing administration, significantly decreases a potential attacker's uncertainty on a ...
Celotno besedilo
10.
  • Impact of Dust and Sand on ... Impact of Dust and Sand on 5G Communications for Connected Vehicles Applications
    Abuhdima, Esmail; Liu, Jian; Zhao, Chunheng ... IEEE journal of radio frequency identification (Online), 2022, Letnik: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Recent research activities are focused on improving Vehicle-to-Vehicle Communication (V2V) based on the 5G Technology. V2V applications are important because they are expected to reduce the risk of ...
Celotno besedilo
1 2 3 4 5
zadetkov: 130

Nalaganje filtrov