¹úÇìÏ×Àñ ¾ÅÓÎÀÏ¸ç¿Æ¼¼ÌìÊàʵÑéÊÒÑо¿Ð§¹ûÔÙ»ñѧÊõ½çÈÏ¿É
2020-10-01
¿ËÈÕ£¬¾ÅÓÎÀÏ¸ç¿Æ¼¼ÌìÊàʵÑéÊÒ³ÂÀÚ²©Ê¿¡¢ÕÅÈó×̲©Ê¿ÒÔ¼°Í¯Ã÷¿Ñо¿Ô±µÄÂÛÎı»¹ú¼ÊѧÊõ¾Û»áÓëÆÚ¿¯ÊÕ¼£¬Îª¾ÅÓÎÀÏ¸ç¿Æ¼¼ÏíÓþº£ÄÚÍâµÄÇå¾²Ñо¿ÄÜÁ¦Ìíש¼ÓÍߣ¬Ò²Îª¹úÇìÏ×Àñ¡£
¡¶IEEE TRANSACTIONS ON MULTIMEDIA¡·
ÌìÊàʵÑéÊÒ³ÂÀÚ²©Ê¿Óë¶«±±´óѧ¡¢°ÄÃÅ´óѧµÄÏÈÉúÃÇÍŽáÐû²¼ÃûΪ¡¶Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes¡·µÄÂÛÎÄÊÕ¼ÓÚ¹ú¼ÊѧÊõÆÚ¿¯¡¶IEEE Transactions On Multimedia¡·¡£¸ÃÆÚ¿¯ÊôÓÚÖпÆÔºµÄÅÌËã»ú¿ÆÑ§´óÀàµÄ1ÇøSCIÆÚ¿¯£¬ÏÖÔÚµÄÓ°ÏìÒò×ÓΪ6.051£¬¸ÃÆÚ¿¯ÊôÓÚ¶àýÌåÊÖÒÕÓëÓ¦ÓõĶ¥¼¶È¨ÍþÆÚ¿¯¡£½ÒÏþµÄЧ¹û¾Û½¹ÔÚͼÏñ¼ÓÃÜËã·¨µÄÃÜÂëÆÊÎö£¬¶ÔÒ»Àà»ùÓÚ“Öû»-À©É¢”ÀàÐÍͼÏñÃÜÂëÌá³öͨÓõÄÑ¡ÔñÃ÷ÎĹ¥»÷¿ò¼ÜÓëËã·¨£¬¸ÃÒªÁì¿ÉÀÖ³ÉÓ¦ÓÃÔÚÊýÊ®ÖÖ¸ÃÀàÐ͵ÄÃÜÂë¼Æ»®ÖС£¸ÃЧ¹ûÓÐÀûÓÚÔö½øÐÂÐÍͼÏñÃÜÂëËã·¨µÄÉè¼ÆÒÔ¼°Í¼ÏñÇå¾²ÊÖÒÕµÄÉú³¤¡£
³ÂÀÚ²©Ê¿ÏÖÔÚΪ¾ÅÓÎÀÏ¸ç¿Æ¼¼ÓëÇ廪´óѧÍŽá×÷ÓýµÄ²©Ê¿ºó£¬´ÓÊÂÃÜÂëѧ¡¢Êý¾ÝÇå¾²¡¢ÍÑÃôÆÀ¹À¡¢Çå¾²¶à·½ÅÌËãµÈÆ«ÏòµÄÑо¿¡£
¡¶IEEE TrustCom 2020 Conference¡·
ÌìÊàʵÑéÊÒÕÅÈó×̲©Ê¿µÄÂÛÎÄ¡¶CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic¡·ÒÔ¼°Í¯Ã÷¿Ñо¿Ô±µÄÂÛÎÄ¡¶Far from classi?cation algorithm: dive into the preprocessing stage in DGA detection¡·Í¬Ê±±»¾Û»á——The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020)ÈÎÃü¡£
ÕÅÈó×̲©Ê¿ÂÛÎÄËùÉæ¼°ÊÖÒռƻ®»ùÓÚ¿ÉÚ¹ÊÍÈ˹¤ÖÇÄÜÊÖÒÕ£¨XAI£©ÓëÎÞ¼àÊÓ¾ÛÀàËã·¨£¬´Ó»úеѧϰģ×ÓÖÐÌáÈ¡Êý¾Ý¼ÍÂÉ£¬ÐγɾßÓеÍÎ󱨡¢¸ßÕÙ»ØÂÊÌØÕ÷µÄ֪ʶ¹æÔò£¬Äܹ»ÓÐÓýâ·ÅÇå¾²Ñо¿Ö°Ô±µÄË«ÊÖ£¬½µµÍÍþвÆÊÎöÀú³Ì¶Ôר¼ÒÂÄÀúµÄÒÀÀµ£¬ÌáÉý¸ß¼¶ÍþвÆÊÎöµÄЧÂÊ£¬Ëõ¶ÌÍþвÊÂÎñ´¦Öóͷ£µÄÖÜÆÚ¡£
ÕÅÈó×̲©Ê¿ÏÖÔÚΪ¾ÅÓÎÀÏ¸ç¿Æ¼¼ÓëÇ廪´óѧÍŽá×÷ÓýµÄ²©Ê¿ºó£¬Ö÷ÒªÑо¿Æ«Ïò°üÀ¨ÖÇÄÜÇå¾²ÔËÓª¡¢Íþвá÷ÁÔ¡¢¿ÉÚ¹ÊÍÈ˹¤ÖÇÄܵȡ£
ͯÃ÷¿Ñо¿Ô±µÄÂÛÎĹØ×¢¹¤Òµ½çºÍѧÊõ½çµÄÈÈÃÅÓëÄѵ㣺“DGAÓòÃû¼ì²â”£¬ÒÀÍоÅÓÎÀÏ¸ç¿Æ¼¼ÊÕÂÞµÄÕæÊµDNSÊý¾ÝºÍ´ó×ÚÕæÊµDGAÓòÃûÊý¾Ý£¬Ö¸³öÓòÃûµÄÔ¤´¦Öóͷ£½×¶Î¹ØÓÚDGAÓòÃûµÄ¼ì²âЧ¹ûÓÐÏÔÖøÓ°Ï죬²¢Ìá³öϵͳµÄÓòÃûÔ¤´¦Öóͷ£¼Æ»®£¬Ê¹Óøüƻ®¿ÉÒÔʹÏÖÔÚµÄDGAÓòÃû¼ì²âËã·¨µÄ¼ì²âЧ¹û»ñµÃÏÔ×ÅÌáÉý¡£
ͯÃ÷¿Ñо¿Ô±Ë¶Ê¿½áÒµÓÚÇ廪´óѧÅÌËã»úϵ£¬Ö÷Òª´ÓÊÂDNSÇå¾²¡¢Çå¾²ÔËÓª¡¢ÓʼþÇå¾²µÈ·½ÃæµÄÑо¿¡£
IEEE TrustComÊÇCCF CÀà¹ú¼Ê¾Û»á£¬Ö÷Òª¹Ø×¢ÍøÂçÐÅÍС¢ÍøÂçÇå¾²¡¢Òþ˽±£»¤¡¢ÍøÂçȡ֤¼°Êý¾ÝÆÊÎöÊÖÒÕÇ°ÑØÑо¿¡£IEEE TrustCom 2020½«ÔÚ2020Äê12ÔÂ29ÈÕµ½2021Äê1ÔÂ1ÈÕÔÚÖйú¹ãÖݾÙÐУ¬½ìʱ½«¶ÔÂÛÎľÙÐо«²Ê½â˵¡£
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄ
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄ£¨NSFOCUS Threat Intelligence center, NTI£©ÊǾÅÓÎÀÏ¸ç¿Æ¼¼ÎªÂäʵÖÇ»ÛÇå¾²2.0Õ½ÂÔ£¬Ôö½øÍøÂç¿Õ¼äÇå¾²Éú̬½¨ÉèºÍÍþвÇ鱨ӦÓã¬ÔöÇ¿¿Í»§¹¥·À¶Ô¿¹ÄÜÁ¦¶ø×齨µÄרҵÐÔÇå¾²Ñо¿×éÖ¯¡£ÆäÒÀÍй«Ë¾×¨ÒµµÄÇå¾²ÍŶӺÍǿʢµÄÇå¾²Ñо¿ÄÜÁ¦£¬¶ÔÈ«ÇòÍøÂçÇå¾²ÍþвºÍÌ¬ÊÆ¾ÙÐÐÒ»Á¬ÊÓ²ìºÍÆÊÎö£¬ÒÔÍþвÇ鱨µÄÉú²ú¡¢ÔËÓª¡¢Ó¦ÓõÈÄÜÁ¦¼°Òªº¦ÊÖÒÕ×÷Ϊ½¹µãÑо¿ÄÚÈÝ£¬ÍƳöÁ˾ÅÓÎÀϸçÍþвÇ鱨ƽ̨ÒÔ¼°Ò»ÏµÁм¯³ÉÍþвÇ鱨µÄÐÂÒ»´úÇå¾²²úÆ·£¬ÎªÓû§Ìṩ¿É²Ù×÷µÄÇ鱨Êý¾Ý¡¢×¨ÒµµÄÇ鱨·þÎñºÍ¸ßЧµÄÍþв·À»¤ÄÜÁ¦£¬×ÊÖúÓû§¸üºÃµØÏàʶºÍÓ¦¶ÔÖÖÖÖÍøÂçÍþв¡£
NTI꿅᣼https://nti.nsfocus.com/
¹ØÓÚÌìÊàʵÑéÊÒ
ÌìÊàʵÑéÊÒ¾Û½¹Çå¾²Êý¾Ý¡¢AI¹¥·ÀµÈ·½ÃæÑо¿£¬ÒÔÆÚÔÚ“Êý¾ÝÖÇÄÜ”ÁìÓò»ñµÃÍ»ÆÆ¡£

¾ÅÓÎÀϸçÔÆ







