Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
79,45 €*
Versandkostenfrei per Post / DHL
Lieferzeit 4-7 Werktage
Kategorien:
Beschreibung
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1¿3, 2023.
The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1¿3, 2023.
The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity
Inhaltsverzeichnis
Cyberspace Security.- Bilateral Personalized Information Fusion in Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in Binary Similarity Systems.- How does post-quantum cryptography affect Central Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model.- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.- Process Mining with Programmable Logic ControllerMemory States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A Machine Learning-based Detection Method for Interest Flooding Attacks in VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of privacy data in service cooperation.- Privacy-preserving Blockchain-based Traceability System with Decentralized Ciphertext-Policy Attribute-based Encryption.- A Probability Mapping-Based Privacy Preservation Method for Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep Learning.- Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for Data Storage and Query Processing.- Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
Details
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Anwendungs-Software |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | Communications in Computer and Information Science |
Inhalt: |
xv
464 S. 21 s/w Illustr. 135 farbige Illustr. 464 p. 156 illus. 135 illus. in color. |
ISBN-13: | 9789819712731 |
ISBN-10: | 9819712734 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Redaktion: |
Wang, Guojun
Wang, Haozhe Meng, Weizhi Georgalas, Nektarios Min, Geyong |
Herausgeber: | Guojun Wang/Haozhe Wang/Geyong Min et al |
Hersteller: |
Springer Singapore
Springer Nature Singapore Communications in Computer and Information Science |
Maße: | 235 x 155 x 26 mm |
Von/Mit: | Guojun Wang (u. a.) |
Erscheinungsdatum: | 13.03.2024 |
Gewicht: | 0,721 kg |
Inhaltsverzeichnis
Cyberspace Security.- Bilateral Personalized Information Fusion in Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in Binary Similarity Systems.- How does post-quantum cryptography affect Central Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model.- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.- Process Mining with Programmable Logic ControllerMemory States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A Machine Learning-based Detection Method for Interest Flooding Attacks in VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of privacy data in service cooperation.- Privacy-preserving Blockchain-based Traceability System with Decentralized Ciphertext-Policy Attribute-based Encryption.- A Probability Mapping-Based Privacy Preservation Method for Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep Learning.- Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for Data Storage and Query Processing.- Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
Details
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Anwendungs-Software |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | Communications in Computer and Information Science |
Inhalt: |
xv
464 S. 21 s/w Illustr. 135 farbige Illustr. 464 p. 156 illus. 135 illus. in color. |
ISBN-13: | 9789819712731 |
ISBN-10: | 9819712734 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Redaktion: |
Wang, Guojun
Wang, Haozhe Meng, Weizhi Georgalas, Nektarios Min, Geyong |
Herausgeber: | Guojun Wang/Haozhe Wang/Geyong Min et al |
Hersteller: |
Springer Singapore
Springer Nature Singapore Communications in Computer and Information Science |
Maße: | 235 x 155 x 26 mm |
Von/Mit: | Guojun Wang (u. a.) |
Erscheinungsdatum: | 13.03.2024 |
Gewicht: | 0,721 kg |
Warnhinweis