researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
1990
1992
2015
2016
2018
Filter by Tag
OR
AND
NOT
1
algebra
logic
logic programming
programming
reflection
relational algebra
semantics
Filter by Author
[+]
OR
AND
NOT
1
Ahmed Serhrouchni
Badis Hammi
Changsong Chen 0002
Cunqing Hua
Gongliang Chen
Gérard Memmi
Han Qiu 0001
Hongyuan Chen
Houda Labiod
Jiachen Shen
Jianhua Li
Jun Zhang
Junhua Tang
Li Pan
Lyes Khoukhi
Ping Yi
Rida Khatoun
Shaoyin Cheng
Shiyong Zhang
Xiuzhen Chen
Filter by Top terms
[+]
OR
AND
NOT
1
attack
authentication
control
cyber
data
detection
encryption
industrial
information
international
learning
logic
networks
scheme
secure
security
smart
social
system
vehicular
Nonclassical Logics and Information Processing (berlin)
Editions
Publications
Viewing Publication 1 - 79 from 79
2018
A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods
Han Qiu 0001
,
Nathalie Enfrin
,
Gérard Memmi
.
berlin 2018
:
1-7
[doi]
Third International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2018, Shanghai, China, October 18-19, 2018
IEEE,
2018.
[doi]
Least Cost Precision Marketing Based on User Profiles in Social Networks
Mengyi Chen
,
Li Pan
.
berlin 2018
:
1-8
[doi]
SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems
Hongyuan Chen
,
Zhenfu Cao
,
Xiaolei Dong
,
Jiachen Shen
.
berlin 2018
:
1-6
[doi]
Detection of DGA Domains Based on Support Vector Machine
Yu Chen
,
Sheng Yan
,
Tianyu Pang
,
Rui Chen
.
berlin 2018
:
1-4
[doi]
Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks
Hong-Beom Choi
,
Young-Bae Ko
,
Keun Woo Lim
.
berlin 2018
:
1-8
[doi]
An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approach
Achraf Fayad
,
Badis Hammi
,
Rida Khatoun
.
berlin 2018
:
1-7
[doi]
Machine Learning-based RF Jamming Detection in Wireless Networks
Zhutian Feng
,
Cunqing Hua
.
berlin 2018
:
1-6
[doi]
Multi-SDN Based Cooperation Scheme for DDoS Attack Defense
Boren He
,
Futai Zou
,
Yue Wu
.
berlin 2018
:
1-7
[doi]
Dispatching and Distributing Energy in Energy Internet under Energy Dilemma
Yunlong Hu
,
Ping Yi
,
Yu Sui
,
Zongrui Zhang
,
Yao Yao
,
Wei Wang 0190
,
Ting Zhu
.
berlin 2018
:
1-5
[doi]
An Improved Group-based Influence Maximization Method in Social Networks
Danhua Huang
,
Li Pan
.
berlin 2018
:
1-6
[doi]
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication
Liang Hui
,
Xiaolei Dong
,
Jiachen Shen
,
Zhenfu Cao
,
Hongyuan Chen
,
Yunong Liang
.
berlin 2018
:
1-8
[doi]
A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs
Qingyuan Li
,
Hao Wu
,
Lei Liu
,
Bin Pan
,
Lan Dong
.
berlin 2018
:
1-5
[doi]
Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method
Huijie Lian
,
Guangbo Wang
,
QingXian Wang
.
berlin 2018
:
1-8
[doi]
PU Learning in Payload-based Web Anomaly Detection
Yuxuan Luo
,
Shaoyin Cheng
,
Chong Liu
,
Fan Jiang
.
berlin 2018
:
1-5
[doi]
Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning Framework
Yishuang Meng
,
Ping Yi
,
Xuejun Guo
,
Wen Gu
,
Xin Liu
,
Wei Wang
,
Ting Zhu
.
berlin 2018
:
1-8
[doi]
"My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension
Jean Philippe Monteuuis
,
Jonathan Petit
,
Jun Zhang
,
Houda Labiod
,
Stefano Mafrica
,
Alain Servel
.
berlin 2018
:
1-8
[doi]
Image Mapping through Metadata
Caleb Riggs
,
Tanner Douglas
,
Kanwalinderjit Gagneja
.
berlin 2018
:
1-8
[doi]
Data Hiding for Color Image by Rubik's Cube
Chih-Wei Shiu
,
Wien Hong
,
Jeanne Chen
,
Tung-Shou Chen
,
Wan-Yi Ji
.
berlin 2018
:
1-5
[doi]
Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data Possession
Gaobo Sun
,
Shuyu Li
,
Zhanchun Kang
.
berlin 2018
:
1-6
[doi]
Performance Modeling towards Interrupt System of Virtualized Cryptography Device
Lei Sun
,
Shuai Li
,
Songhui Guo
,
Yingxin Xu
.
berlin 2018
:
1-6
[doi]
Caching Strategy for Scalable Video Coding in Information-Centric Networking
Junhua Tang
,
Shuli Zhao
,
Yue Wu 0010
,
Jianhua Li
.
berlin 2018
:
1-6
[doi]
Assessing Industrial Control System Attack Datasets for Intrusion Detection
Xuelei Wang
,
Ernest Foo
.
berlin 2018
:
1-8
[doi]
A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System
Xiaoliang Wang
,
Junhua Tang
,
Mengdi Yu
,
Gubei Yin
,
Jianhua Li
.
berlin 2018
:
1-6
[doi]
Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power Cables
Chenbin Wu
,
Yunjie Zhou
,
Xiaojuan Jiang
,
Yinbai Xu
,
Xiaodi Wang
,
He He
.
berlin 2018
:
1-5
[doi]
VTET: A Virtual Industrial Control System Testbed for Cyber Security Research
Yaobin Xie
,
Wei Wang
,
Faren Wang
,
Rui Chang
.
berlin 2018
:
1-7
[doi]
Total Eclipse: How To Completely Isolate a Bitcoin Peer
Adja Elloh Yves-Christian
,
Badis Hammi
,
Ahmed Serhrouchni
,
Houda Labiod
.
berlin 2018
:
1-7
[doi]
A Novel Android Malware Detection Approach Using Operand Sequences
Peng Zhang
,
Shaoyin Cheng
,
Songhao Lou
,
Fan Jiang 0005
.
berlin 2018
:
1-5
[doi]
Least Cost Rumor Community Blocking optimization in Social Networks
Jianguo Zheng
,
Li Pan
.
berlin 2018
:
1-5
[doi]
Classification of botnet families based on features self-learning under Network Traffic Censorship
Zhihong Zhou
,
Lihong Yao
,
Jianhua Li
,
Bin Hu
,
Chen Wang
,
Zhenglong Wang
.
berlin 2018
:
1-7
[doi]
2016
International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2016, Paris, France, July 18-19, 2016
IEEE,
2016.
[doi]
An approach based on the clustering coefficient for the community detection in social networks
Khawla Asmi
,
Dounia Lotfi
,
Mohamed El Marraki
.
berlin 2016
:
1-8
[doi]
Secure range query based on privacy-preserving function in two-tiered sensor networks
Peng Chen
,
Weini Zeng
,
Yong Zhu
,
Yingyan Gu
.
berlin 2016
:
1-6
[doi]
Securing tactical service oriented architectures
Vasileios Gkioulos
,
Stephen D. Wolthusen
.
berlin 2016
:
1-6
[doi]
Improved task partition based fault-tolerant rate-monotonic scheduling algorithm
Pengze Guo
,
Zhi Xue
.
berlin 2016
:
1-5
[doi]
Clustering methods comparison: Application to source based detection of botclouds
Badis Hammi
,
Mohamed Cherif Rahal
,
Rida Khatoun
.
berlin 2016
:
1-7
[doi]
Evaluation of RAIN RFID authentication schemes
Ahmad Shahrafidz Khalid
,
Emmanuel Conchon
,
Fabrice Peyrard
.
berlin 2016
:
1-8
[doi]
The performance impact of encryption in an asynchronous cloud environment
Andrei F. Klein
,
Mihai Stefanescu
,
Alan Saied
,
Kurt Swakhoven
.
berlin 2016
:
1-6
[doi]
Security authentication mechanism based on symmetric polynomials for SCADA systems
Yue Lu
,
Xiuzhen Chen
,
Changsong Chen 0002
.
berlin 2016
:
1-6
[doi]
Channel aware resource allocation for device-to-device communication underlaying cellular networks
Junhua Tang
,
Shujun Lin
,
Cunqing Hua
,
Yue Wu
,
Jianhua Li
.
berlin 2016
:
1-5
[doi]
A challenge-response authentication for RFID using Enhanced-Trivium
Siye Wang
,
Shiyong Zhang
,
Lifeng Liu
,
Gongliang Chen
.
berlin 2016
:
1-5
[doi]
Cube attack on reduced-round Enhanced-Bivium
Shiyong Zhang
,
Gongliang Chen
,
Jianhua Li
.
berlin 2016
:
1-4
[doi]
Toward interests drift mechanism for social network
Yutao Zhang
,
Gongshen Liu
,
Jun Wu
,
Jianhua Li
,
Longhua Guo
.
berlin 2016
:
1-5
[doi]
Cooperation behavior of vehicles in an evolutionary game for information dissemination
Jun Zhang
,
Houda Labiod
,
Mengying Ren
,
Hengchuan Tan
.
berlin 2016
:
1-8
[doi]
Multiple SDN controller orchestration for financial cloud
Yongkai Zhou
,
Hang Yuan
,
Lijun Zu
,
Guobao Liu
,
Ge Li
.
berlin 2016
:
1-6
[doi]
2015
A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks
Yue Wu 0010
,
Fanchao Meng
,
Guanghao Wang
,
Ping Yi
.
berlin 2015
:
1-7
[doi]
International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications, SSIC 2015, Shanghai, China, August 5-7, 2015
IEEE,
2015.
[doi]
A novel Fibonacci windows model for finding emerging patterns over online data stream
Tubagus Mohammad Akhriza
,
Yinghua Ma
,
Jianhua Li
.
berlin 2015
:
1-8
[doi]
Bayesian-based model for a reputation system in vehicular networks
Youcef Begriche
,
Rida Khatoun
,
Lyes Khoukhi
,
Xiuzhen Chen
.
berlin 2015
:
1-6
[doi]
A solution based analysis of attack vectors on smart home systems
Andreas Brauchli
,
Depeng Li
.
berlin 2015
:
1-6
[doi]
Classified security protection evaluation for vehicle information system
Huangmiao Chen
,
Xiuzhen Chen
,
Lei Fan
,
Changsong Chen 0002
.
berlin 2015
:
1-6
[doi]
Security in MIMO wireless hybrid channel with artificial noise
Xiao Chen
,
Liang Pang
,
Yuhuan Tang
,
Hongpeng Yang
,
Zhi Xue
.
berlin 2015
:
1-4
[doi]
Secure Public Key Regime (SPKR) in vehicular networks
Tan Heng Chuan
,
Jun Zhang
,
Maode Ma
,
Peter Han Joo Chong
,
Houda Labiod
.
berlin 2015
:
1-7
[doi]
Analysis of cyber security for industrial control systems
Zakarya Drias
,
Ahmed Serhrouchni
,
Olivier Vogel
.
berlin 2015
:
1-8
[doi]
Overview of cyber-security of industrial control system
Xiaohe Fan
,
Kefeng Fan
,
Yong Wang
,
Ruikang Zhou
.
berlin 2015
:
1-7
[doi]
On the use of security analytics for attack detection in vehicular ad hoc networks
Dhavy Gantsou
.
berlin 2015
:
1-6
[doi]
Secure access & authentication for collaborative intercloud exchange service
Fouad Amine Guenane
,
Ahmed Serhrouchni
.
berlin 2015
:
1-5
[doi]
Malicious data identification in smart grid based on residual error method
Zongshuai Hu
,
Yong Wang
,
Chunhua Gu
,
Dejun Mengm
,
Xiaoli Yang
,
Shuai Chen
.
berlin 2015
:
1-5
[doi]
A reputation system for detection of black hole attack in vehicular networking
Rida Khatoun
,
P. Gut
,
R. Doulami
,
L. Khoukhi
,
Ahmed Serhrouchni
.
berlin 2015
:
1-5
[doi]
Data protection: Combining fragmentation, encryption, and dispersion
Gérard Memmi
,
Katarzyna Kapusta
,
Han Qiu 0001
.
berlin 2015
:
1-9
[doi]
Safe box cloud authentication using TLS extesion
Mounira Msahli
,
Mohamed Tahar Hammi
,
Ahmed Serhrouchni
.
berlin 2015
:
1-6
[doi]
Flooding attacks detection in MANETs
Mohammad Rmayti
,
Youcef Begriche
,
Rida Khatoun
,
Lyes Khoukhi
,
Dominique Gaïti
.
berlin 2015
:
1-6
[doi]
A testbed for SCADA cyber security and intrusion detection
Prateek Singh
,
Saurabh Garg
,
Vinod Kumar
,
Zia Saquib
.
berlin 2015
:
1-6
[doi]
Survey on packet marking fields and information for IP traceback
Marion Vasseur
,
Xiuzhen Chen
,
Rida Khatoun
,
Ahmed Serhrouchni
.
berlin 2015
:
1-8
[doi]
Data security and threat modeling for smart city infrastructure
Paul Wang
,
Amjad Ali
,
William Kelly
.
berlin 2015
:
1-6
[doi]
A new genetic-based rumor diffusion model for social networks
Yanan Wang
,
Xiuzhen Chen
,
Jianhua Li
.
berlin 2015
:
1-5
[doi]
Malicious URL prediction based on community detection
Li-Xiong Zheng
,
Xiao-Lin Xu
,
Jia Li
,
Lu Zhang
,
Xuan-Chen Pan
,
Zhi-Yuan Ma
,
Li-Hong Zhang
.
berlin 2015
:
1-7
[doi]
A random key management scheme for heterogeneous wireless sensor network
Lina Zhu
,
Zuochang Zhan
.
berlin 2015
:
1-5
[doi]
1992
Nonclassical Logics and Information Processing, International Workshop, Berlin, Germany, November 9-10, Proceedings
David Pearce
,
Heinrich Wansing
, editors,
Volume 619 of
Lecture Notes in Computer Science
, Springer,
1992.
1990
Conditional Logics and Cumulative Logics
André Fuhrmann
.
berlin 1992
:
92-103
Testclasses and Closed World Assumptions for Non-Horn Theories
Jürgen Gehne
.
berlin 1992
:
56-62
Semantics of Nonmonotonic Reasoning in Logic Programming
Heinrich Herre
.
berlin 1992
:
104-124
Actions with Preconditions and Postconditions
Michael Morreau
.
berlin 1992
:
46-55
Algebraic Aspects of the Relational Knowledge Representation: Modal Relation Algebras
Ewa Orlowska
.
berlin 1992
:
1-22
Reasoning with Negative Information, II: Hard Negation, Strong Negation and Logic Programs
David Pearce
.
berlin 1992
:
63-79
Cut Elimination for Logics with Definitional Reflection
Peter Schroeder-Heister
.
berlin 1992
:
146-171
A Logic for Memory
Christian Schumacher
.
berlin 1992
:
23-45
Lindenbaum-Algebraic Semantics of Logic Programs
Gerd Wagner
.
berlin 1992
:
80-91
Formulas-as-types for a Hierarchy of Sublogics of Intuitionistic Propositional Logic
Heinrich Wansing
.
berlin 1992
:
125-145
Sign in
or
sign up
to see more results.