Search

Your search keyword '"GUANGJIE LIU"' showing total 26 results

Search Constraints

Start Over You searched for: Author "GUANGJIE LIU" Remove constraint Author: "GUANGJIE LIU" Topic computer Remove constraint Topic: computer
26 results on '"GUANGJIE LIU"'

Search Results

1. Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game

2. Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure

3. Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model

4. Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information

5. Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model

6. Refined identification of hybrid traffic in DNS tunnels based on regression analysis

7. Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid

8. Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework

9. Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems

10. Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

11. Bandgap prediction of two-dimensional materials using machine learning

12. The Hot Spots Components from Drawings of Subway Using Template Matching

13. Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis

14. A Comprehensive Analysis of Interval Based Network Flow Watermarking

15. Designing S-boxes based on 3-D four-wing autonomous chaotic system

16. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

17. Detection of TCP covert channel based on Markov model

18. Smart-Line Based Watermarking Scheme for 3D Computer-Aided Plant Design Models

19. Packet signature mining for application identification using an improved Apriori algorithm

20. Secure Multimedia Distribution Based on Watermarking and Encryption

21. Efficient video encryption scheme based on advanced video coding

22. Detecting Image Splicing Using Merged Features in Chroma Space

23. Multimedia Content Tracing Scheme Based on Tardos' Fingerprint Codes

24. Security Analysis of Content-Based Watermarking Authentication Framework

25. On the analysis and design of secure multimedia authentication scheme

26. Data Hiding in Neural Network Prediction Errors

Catalog

Books, media, physical & digital resources