Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 462
Editat de Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikasen Limba Engleză Paperback – 4 feb 2023
The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 5%
Preț: 309.16 lei - 20%
Preț: 314.67 lei -
Preț: 385.99 lei - 20%
Preț: 498.46 lei - 20%
Preț: 270.83 lei - 20%
Preț: 270.73 lei - 20%
Preț: 270.83 lei - 20%
Preț: 317.05 lei - 20%
Preț: 270.23 lei - 20%
Preț: 270.98 lei - 20%
Preț: 314.67 lei - 20%
Preț: 317.05 lei - 20%
Preț: 326.72 lei - 20%
Preț: 321.03 lei - 20%
Preț: 313.42 lei - 20%
Preț: 458.69 lei - 20%
Preț: 317.05 lei - 20%
Preț: 494.87 lei - 20%
Preț: 530.10 lei - 20%
Preț: 495.28 lei - 20%
Preț: 495.12 lei - 20%
Preț: 458.99 lei - 20%
Preț: 388.57 lei - 20%
Preț: 494.83 lei - 18%
Preț: 931.81 lei - 20%
Preț: 529.35 lei - 20%
Preț: 494.68 lei - 20%
Preț: 495.67 lei - 20%
Preț: 388.11 lei - 20%
Preț: 573.45 lei - 20%
Preț: 647.15 lei - 20%
Preț: 388.26 lei - 20%
Preț: 459.10 lei - 20%
Preț: 315.48 lei - 20%
Preț: 459.55 lei - 20%
Preț: 635.26 lei - 5%
Preț: 553.86 lei - 20%
Preț: 481.11 lei - 20%
Preț: 319.42 lei - 20%
Preț: 459.78 lei - 20%
Preț: 956.44 lei - 20%
Preț: 335.29 lei - 20%
Preț: 329.60 lei - 20%
Preț: 642.40 lei - 20%
Preț: 328.94 lei - 20%
Preț: 328.16 lei -
Preț: 370.10 lei - 20%
Preț: 644.77 lei - 5%
Preț: 287.80 lei - 20%
Preț: 314.86 lei
Preț: 756.53 lei
Preț vechi: 945.66 lei
-20% Nou
Puncte Express: 1135
Preț estimativ în valută:
133.89€ • 157.02$ • 117.39£
133.89€ • 157.02$ • 117.39£
Carte tipărită la comandă
Livrare economică 26 ianuarie-09 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031255373
ISBN-10: 3031255372
Pagini: 840
Ilustrații: XV, 840 p. 232 illus., 189 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.18 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3031255372
Pagini: 840
Ilustrații: XV, 840 p. 232 illus., 189 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.18 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
AI for Security.- Classification-Based Anomaly Prediction in XACML Policies.- An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification.- SecureBERT: A Domain-Specific Language Model for Cybersecurity.- CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network.- Towards high transferability on neural network for black-box adversarial attacks.- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy.- Applied Cryptography.- Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature.- MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT.- A Cross-layer Plausibly Deniable Encryption System for Mobile Devices.- Binary Analysis.- Language and platform independent attribution of heterogeneous code.- Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison.- Cost-effective malware classification based on deep active learning.- Blockchain.- CTDRB: Controllable Timed Data Release using Blockchains.- FairBlock: Preventing Blockchain Front-running with Minimal Overheads.- Blockchain-based Ciphertext Policy-hiding Access Control Scheme.- Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers.- Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification.- Cryptography.- TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation.- Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives.- Replicated additive secret sharing with the optimized number of shares.- Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation.- Data Security.- A Random Reversible Watermarking Schefme for Relational Data.- Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks.- Bootstrapping Trust in Community Repository Projects.- Intrusion Detection.- Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection.- Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning.- AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.- Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks.- Mobile Security.- What Data Do The Google Dialer and Messages Apps On Android Send to Google?.- Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps.- Secure CV2X using COTS Smartphones over LTE Infrastructure.- Network Security.- DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network.- Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation.- PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information.- Privacy.- Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly.- MetaPriv: Acting in Favor of Privacy on Social Media Platforms.- Adversary for Social Good: Leveraging AttributeObfuscating Attack to Protect User Privacy on Social Networks.- Software Security.- No-Fuzz: Efficient Anti-Fuzzing Techniques.- eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense.- Breaking Embedded Software Homogeneity with Protocol Mutations.- Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).- A Generalized Unknown Malware Classification.- Research on the Grouping Method of Side-Channel Leakage Detection.- PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX.