A Crawler Guard for Quickly Blocking Unauthorized Web Robot.- Privacy Preserving for Location-Based Services Using Location Transformation.- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.- Multiple-Bank E-Cash without Random Oracles.- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy.- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics.- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures.- Towards a Security-Enhanced Firewall Application for OpenFlow Networks.- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows.- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks.- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6.- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks.- Alert Correlation Algorithms: A Survey and Taxonomy.- Construction and Verification of Mobile Ad Hoc Network Protocols.- Zero-Day Traffic Identification.- Design and Implementation of a Testbed for the Security Assessment of MANETs.- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.- Anonymous Identity-Based Broadcast Encryption with Adaptive Security.- Hierarchical Identity-Based Signature with Short Public Keys.- PeerViewer: Behavioral Tracking and Classification of P2P Malware.- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification.- Detecting Stepping Stones by Abnormal Causality Probability.- Algebra-Based Behavior Identification of Trojan Horse.- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards.- The Hot-Spots Problem in Windows 8 Graphical Password Scheme.- Static Detection of Dangerous Behaviors in Android Apps.- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function.- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.- NetSecRadar: A Visualization System for Network Security Situational Awareness.- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System.- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space.- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux.- Towards an Open Framework Leveraging a Trusted Execution Environment.- Secure Re-publication of Dynamic Big Data.
[1]
Srikanth Kandula,et al.
Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds
,
2005,
NSDI.
[2]
Young-Gab Kim,et al.
Web robot detection based on pattern-matching technique
,
2012,
J. Inf. Sci..
[3]
Michael Benedikt,et al.
VeriWeb: Automatically Testing Dynamic Web Sites
,
2002
.
[4]
Marios D. Dikaiakos,et al.
Web robot detection: A probabilistic reasoning approach
,
2009,
Comput. Networks.
[5]
C. Lee Giles,et al.
BotSeer: An Automated Information System for Analyzing Web Robots
,
2008,
2008 Eighth International Conference on Web Engineering.
[6]
Marios D. Dikaiakos,et al.
Characterizing Crawler Behavior from Web Server Access Logs
,
2003,
EC-Web.
[7]
Swapna S. Gokhale,et al.
Discovering New Trends in Web Robot Traffic Through Functional Classification
,
2008,
2008 Seventh IEEE International Symposium on Network Computing and Applications.
[8]
Kang-Won Lee,et al.
Securing Web Service by Automatic Robot Detection
,
2006,
USENIX Annual Technical Conference, General Track.
[9]
Yusheng Ji,et al.
A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies
,
2009,
IEICE Trans. Inf. Syst..
[10]
Lars Schmidt-Thieme,et al.
Web Robot Detection - Preprocessing Web Logfiles for Robot Detection
,
2005
.
[11]
Marios D. Dikaiakos,et al.
A Probabilistic Reasoning Approach for Discovering Web Crawler Sessions
,
2007,
APWeb/WAIM.
[12]
Sriram Raghavan,et al.
Crawling the Hidden Web
,
2001,
VLDB.
[13]
Ki Hoon Kwon,et al.
Hybrid Intrusion Forecasting Framework for Early Warning System
,
2008,
IEICE Trans. Inf. Syst..