Beijing

Results: 6230



#Item
1Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 12:53:26
2Information science / Collaboration / Humancomputer interaction / Information retrieval / Recommender systems / Human communication / Social information processing / Collective intelligence / Collaborative filtering / Computer-supported cooperative work / Personalization / GroupLens Research

GroupLink: Group Event Recommendations Using Personal Digital Traces Honghao Wei Tsinghua University Beijing, 100084, China

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2018-10-25 09:08:20
3Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30
4

Third Workshop on Script to Program Evolution STOP 2012 This year marks the third edition of the STOP workshop series, and a colocation with ECOOP and PLDI in Beijing, China. For this year’s STOP, the goal was to take

Add to Reading List

Source URL: homes.sice.indiana.edu

Language: English - Date: 2013-08-15 14:47:07
    5Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

    Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 10:57:28
    6

    PDF Document

    Add to Reading List

    Source URL: zhengce.beijing.gov.cn

    - Date: 2018-08-06 22:14:54
      7

      PDF Document

      Add to Reading List

      Source URL: asch-public.oss-cn-beijing.aliyuncs.com

      - Date: 2018-07-20 03:58:57
        8

        DOCX Document

        Add to Reading List

        Source URL: beijing.gmgc.info

        - Date: 2018-01-10 07:50:59
          9

          PDF Document

          Add to Reading List

          Source URL: www.beijing-essen-welding.com

          - Date: 2017-03-09 01:38:32
            10

            PDF Document

            Add to Reading List

            Source URL: zhengce.beijing.gov.cn

            - Date: 2018-08-06 22:14:53
              UPDATE