Chinese Academy of Sciences

Results: 542



#Item
1Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30
2Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
3Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
4Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
5Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
6

CASSACA Chinese Academy of Sciences South America Center for Astronomy 中科院 南美天文中心 (智利) Camino El Observatorio #1515

Add to Reading List

Source URL: english.nao.cas.cn

Language: English - Date: 2017-08-02 21:39:59
    7

    Dr. Xian Meng Institute of Mechanics, Chinese Academy of Sciences, China Xian Meng received a bachelor’s degree and a master’s degree in applied physics from Dalian University of Technology in 1997 andShe comp

    Add to Reading List

    Source URL: icmap-2018.org

    - Date: 2018-05-25 05:47:02
      8

      UCAS Invitation Letter Application Form Invitation letter issued by University of Chinese Academy of Sciences (UCAS), instead of the “Invitation Letter of Duly Authorized Unit”, is required when applying for F-visa i

      Add to Reading List

      Source URL: sdc.university

      Language: English - Date: 2018-01-02 09:42:01
        9

        Title should be simple, concise and informative A SURNAME1,2 *, B SURNAME 3, C SURNAME 1 1Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, People抯 Republic of China 2The Second Affiliation Name,

        Add to Reading List

        Source URL: icmap-2018.org

        Language: English - Date: 2018-04-03 04:39:08
          10

          Dalian Institute of Chemical Physics, Chinese Academy of Sciences 环保减排 科技成果汇编

          Add to Reading List

          Source URL: www.zcc.dicp.ac.cn

          Language: Chinese - Date: 2018-05-06 02:45:06
            UPDATE