Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Identity Authentication Under Internet of Everything Based on Edge Computing

    With the rapid development of the Internet, the application of the Internet of things and big data is more and more extensive. The era of Internet of everything (IoE) has come, and the traditional cloud comput...

    Zixiao Kong, **gfeng Xue, Yong Wang in Trusted Computing and Information Security (2020)

  2. No Access

    Chapter and Conference Paper

    Detection of Malicious Domains in APT via Mining Massive DNS Logs

    With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C...

    Lu Huang, **gfeng Xue, Weijie Han, Zixiao Kong in Machine Learning for Cyber Security (2020)