Research of malicious nodes identification based on DPAM-DM algorithm for WSN
ZHANG Lin;YIN Na;WANG Ru-chuan;College of Computer;Nanjing University of Posts and Telecommunications;Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks;Institute of Computer Technology;Nanjing University of posts and Telecom Mutilations;Key Lab of Broadband Wireless Communication and Sensor Network Technology;Ministry of Education;Nanjing University of Posts and Telecommunications;
..............page:53-59
..............page:94-102
..............page:103-109
..............page:110-117
Design and implementation of a model for OS kernel integrity protection
TIAN Dong-hai;CHEN Jun-hua;JIA Xiao-qi;HU Chang-zhen;Beijing Key Laboratory of Software Security Engineering Technology;Beijing Institute of Technology;Key Laboratory of IDT Application Technology of Universities in Yunnam Province;Yunnam Minzu University;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:118-125
Clustering-based dynamic privacy preserving method for social networks
GU Yong-hao;LIN Jiu-chuan;GUO Da;Beijing Key Laboratory of Intelligent Telecommunications software and Multimedia;School of Computer Science;Beijing University of Posts and Telecommunications;The Third Research Institute of Ministry of Public Security;School of Electronic Engineering;Beijing University of Posts and Telecommunications;
..............page:126-130
..............page:131-135
..............page:136-140
..............page:141-148
..............page:149-156
..............page:157-161
..............page:162-170
..............page:171-180
..............page:181-187
..............page:188-196
..............page:197-202
..............page:203-214
..............page:215-223
..............page:224-234
..............page:235-242
..............page:243-249
..............page:250-258
..............page:259-265
Adjusted automata learning algorithm for security protocol adaptive model checking
YANG Jing;FAN Dan;ZHANG Yu-qing;Information Security Research Center of State Key Laboratory of Integrated Services Networks;Xidian University;National Computer Network Intrusion Protection Center;University of Chinese Academy of Sciences;State Key Laboratory of Information Security Institute of Information Engineering;Chinese Academy of Sciences;
..............page:266-276