UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
On the strategy and behavior of bitcoin mining with N-attackers Conference paper
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Authors:  Liu H.;  Du R.;  Ruan N.;  Jia W.
Favorite  |  View/Download:3/0  |  Submit date:2019/04/04
Bitcoin  Mining  N-attackers  Selfish mining  
Detect and prevent SIP flooding attacks in VoLTE by utilizing a two-tier PFilter design Conference paper
IEICE Transactions on Information and Systems
Authors:  Ruan N.;  Wu M.;  Ma S.;  Zhu H.;  Jia W.;  Wu S.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/11
Count  Filter  PFilter  SIP flooding attack  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:537/46  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid