<--- Back to Details
First PageDocument Content
Beijing / North China Plain
Date: 2014-02-16 21:10:44
Beijing
North China Plain

German Centre Beijing German Centre Network Forward

Add to Reading List

Source URL: cn.germancentre.org.cn

Download Document from Source Website

File Size: 862,85 KB

Share Document on Facebook

Similar Documents

Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

DocID: 1xVcY - View Document

Information science / Collaboration / Humancomputer interaction / Information retrieval / Recommender systems / Human communication / Social information processing / Collective intelligence / Collaborative filtering / Computer-supported cooperative work / Personalization / GroupLens Research

GroupLink: Group Event Recommendations Using Personal Digital Traces Honghao Wei Tsinghua University Beijing, 100084, China

DocID: 1xV1p - View Document

Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

DocID: 1xUXT - View Document

Third Workshop on Script to Program Evolution STOP 2012 This year marks the third edition of the STOP workshop series, and a colocation with ECOOP and PLDI in Beijing, China. For this year’s STOP, the goal was to take

DocID: 1xTGU - View Document

Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

DocID: 1xTCv - View Document