{"title":"来自STA 2015研讨会组织者的信息","authors":"F. Belli, R. Subramanyan","doi":"10.1109/COMPSAC.2015.310","DOIUrl":null,"url":null,"abstract":"With the network’s application in various areas of Human life, there are many security threats by various attacks such as viruses and information interception. The network applications have attracted continuous attentions from both academia and industry. Especially, the large scale networks (e. g. social networks and wireless sensor network) aggravate the problem of cyber-attack even further. To address these issues of large scale networks, there has been increased interest to propose and design new algorithms and methodologies for network security and applications.","PeriodicalId":74502,"journal":{"name":"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC","volume":"57 1","pages":"416"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Message from the STA 2015 Workshop Organizers\",\"authors\":\"F. Belli, R. Subramanyan\",\"doi\":\"10.1109/COMPSAC.2015.310\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the network’s application in various areas of Human life, there are many security threats by various attacks such as viruses and information interception. The network applications have attracted continuous attentions from both academia and industry. Especially, the large scale networks (e. g. social networks and wireless sensor network) aggravate the problem of cyber-attack even further. To address these issues of large scale networks, there has been increased interest to propose and design new algorithms and methodologies for network security and applications.\",\"PeriodicalId\":74502,\"journal\":{\"name\":\"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC\",\"volume\":\"57 1\",\"pages\":\"416\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPSAC.2015.310\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings : Annual International Computer Software and Applications Conference. COMPSAC","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSAC.2015.310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the network’s application in various areas of Human life, there are many security threats by various attacks such as viruses and information interception. The network applications have attracted continuous attentions from both academia and industry. Especially, the large scale networks (e. g. social networks and wireless sensor network) aggravate the problem of cyber-attack even further. To address these issues of large scale networks, there has been increased interest to propose and design new algorithms and methodologies for network security and applications.