Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Ubiquitous Security
Third International Conference, UbiSec 2023, Exeter, UK, November 1¿3, 2023, Revised Selected Papers
Taschenbuch von Guojun Wang (u. a.)
Sprache: Englisch

79,45 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 4-7 Werktage

Kategorien:
Beschreibung
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1¿3, 2023.

The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1¿3, 2023.

The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity
Inhaltsverzeichnis
Cyberspace Security.- Bilateral Personalized Information Fusion in Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in Binary Similarity Systems.- How does post-quantum cryptography affect Central Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model.- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.- Process Mining with Programmable Logic ControllerMemory States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A Machine Learning-based Detection Method for Interest Flooding Attacks in VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of privacy data in service cooperation.- Privacy-preserving Blockchain-based Traceability System with Decentralized Ciphertext-Policy Attribute-based Encryption.- A Probability Mapping-Based Privacy Preservation Method for Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep Learning.- Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for Data Storage and Query Processing.- Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
Details
Erscheinungsjahr: 2024
Fachbereich: Anwendungs-Software
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Reihe: Communications in Computer and Information Science
Inhalt: xv
464 S.
21 s/w Illustr.
135 farbige Illustr.
464 p. 156 illus.
135 illus. in color.
ISBN-13: 9789819712731
ISBN-10: 9819712734
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Redaktion: Wang, Guojun
Wang, Haozhe
Meng, Weizhi
Georgalas, Nektarios
Min, Geyong
Herausgeber: Guojun Wang/Haozhe Wang/Geyong Min et al
Hersteller: Springer Singapore
Springer Nature Singapore
Communications in Computer and Information Science
Maße: 235 x 155 x 26 mm
Von/Mit: Guojun Wang (u. a.)
Erscheinungsdatum: 13.03.2024
Gewicht: 0,721 kg
Artikel-ID: 128413793
Inhaltsverzeichnis
Cyberspace Security.- Bilateral Personalized Information Fusion in Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in Binary Similarity Systems.- How does post-quantum cryptography affect Central Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model.- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.- Process Mining with Programmable Logic ControllerMemory States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A Machine Learning-based Detection Method for Interest Flooding Attacks in VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of privacy data in service cooperation.- Privacy-preserving Blockchain-based Traceability System with Decentralized Ciphertext-Policy Attribute-based Encryption.- A Probability Mapping-Based Privacy Preservation Method for Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep Learning.- Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for Data Storage and Query Processing.- Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
Details
Erscheinungsjahr: 2024
Fachbereich: Anwendungs-Software
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Reihe: Communications in Computer and Information Science
Inhalt: xv
464 S.
21 s/w Illustr.
135 farbige Illustr.
464 p. 156 illus.
135 illus. in color.
ISBN-13: 9789819712731
ISBN-10: 9819712734
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Redaktion: Wang, Guojun
Wang, Haozhe
Meng, Weizhi
Georgalas, Nektarios
Min, Geyong
Herausgeber: Guojun Wang/Haozhe Wang/Geyong Min et al
Hersteller: Springer Singapore
Springer Nature Singapore
Communications in Computer and Information Science
Maße: 235 x 155 x 26 mm
Von/Mit: Guojun Wang (u. a.)
Erscheinungsdatum: 13.03.2024
Gewicht: 0,721 kg
Artikel-ID: 128413793
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte