Security and Privacy in Communication Networks
Editat de Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Auen Limba Engleză Paperback – 15 oct 2024
The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:
Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.
Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 578.20 lei 6-8 săpt. | |
| Springer Nature Switzerland – 17 sep 2024 | 578.20 lei 6-8 săpt. | |
| Springer – 15 oct 2024 | 579.31 lei 6-8 săpt. |
Preț: 579.31 lei
Preț vechi: 724.14 lei
-20%
Puncte Express: 869
Preț estimativ în valută:
102.47€ • 121.71$ • 89.23£
102.47€ • 121.71$ • 89.23£
Carte tipărită la comandă
Livrare economică 28 martie-11 aprilie
Specificații
ISBN-13: 9783031649530
ISBN-10: 3031649532
Pagini: 536
Ilustrații: XII, 484 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.8 kg
Ediția:2024
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3031649532
Pagini: 536
Ilustrații: XII, 484 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.8 kg
Ediția:2024
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
Intrusion and Anomaly Detection.- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent.- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions.- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks.- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification.- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security.- Enhancing Cross Device Security with Fine Grained Permission Control.- The Security Analysis of ROS2 Communication.- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security.- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network.- Securing Web Inputs using Parallel Session Attachments.- Unsupervised and Adaptive Tor Website Fingerprinting.- Visibility of Scan Traffic Trends in Sparsely Populated Darknets.- Privacy.- Do Backdoors Assist Membership Inference Attacks.- Efficient and Scalable Multi Party Privacy Preserving k NN Classification.- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter.- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds.- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks.- Split Without a Leak Reducing Privacy Leakage in Split Learning.- Street Rep A Privacy Preserving Reputation Aggregation System.- Program Analysis.- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis.- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features.- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution.- Ransomware as a Service Demystifying Android Ransomware Generators.- Software Security.- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing.- Learning AI coding style for software plagiarism detection.- Understanding and Measuring Inter Process Code Injection in Windows Malware.