Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Kehuan Zhang"'
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 133-143 (2022)
Abstract Today's IoT platforms provide rich functionalities by integrating with popular third‐party services. Due to the complexity, it is critical to understand whether the IoT platforms have properly managed the authorisation in the cross‐cloud
Externí odkaz:
https://doaj.org/article/8fd06dec1ab547b096ec4dbffe1fc40f
Publikováno v:
Cybersecurity, Vol 1, Iss 1, Pp 1-13 (2018)
Abstract Malware detection has become mission sensitive as its threats spread from computer systems to Internet of things systems. Modern malware variants are generally equipped with sophisticated packers, which allow them bypass modern machine learn
Externí odkaz:
https://doaj.org/article/e1b6961547a047da8475cb0217ad6e51
Publikováno v:
IEEE Access, Vol 6, Pp 51964-51974 (2018)
Since Android has become the dominator of smartphone operating system market with a share of 86.8%, the number of Android malicious applications are increasing rapidly as well. Such a large volume of diversified malware variants has forced researcher
Externí odkaz:
https://doaj.org/article/4028cc91a61349f4b24708ae986abef5
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 133-143 (2022)
Today's IoT platforms provide rich functionalities by integrating with popular third‐party services. Due to the complexity, it is critical to understand whether the IoT platforms have properly managed the authorisation in the cross‐cloud IoT envi
Publikováno v:
25th International Symposium on Research in Attacks, Intrusions and Defenses.
Autor:
Jianqi Du, Fenghao Xu, Chennan Zhang, Zidong Zhang, Xiaoyin Liu, Pengcheng Ren, Wenrui Diao, Shanqing Guo, Kehuan Zhang
Publikováno v:
2022 19th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
Autor:
Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Wenrui Diao, Kehuan Zhang, Jing Lei, Chaojing Tang
Publikováno v:
Proceedings of the 44th International Conference on Software Engineering.
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:2453-2468
With the development of demand response technologies, the pricing scheme in smart grids is moving from flat pricing to multiple pricing (MP), which facilitates the energy saving at the consumer side. However, the flexible pricing policy may be exploi
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031063640
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8a340a7e56c2220c92c992686e9082d6
https://doi.org/10.1007/978-3-031-06365-7_12
https://doi.org/10.1007/978-3-031-06365-7_12
Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for enabling valuable cryptocurrencies and smart contracts. However, the blockchain software systems inevitably have many bugs. Although bugs in smart contracts
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c5d707b7825eb39579df552b1c196d08
http://arxiv.org/abs/2110.12162
http://arxiv.org/abs/2110.12162