Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers: Communications in Computer and Information Science, cartea 1768
Editat de Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damianien Limba Engleză Paperback – 16 feb 2023
The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.
Din seria Communications in Computer and Information Science
- 20%
Preț: 423.55 lei - 20%
Preț: 579.53 lei - 20%
Preț: 460.54 lei - 20%
Preț: 313.10 lei - 20%
Preț: 643.20 lei - 20%
Preț: 312.30 lei - 20%
Preț: 324.99 lei - 20%
Preț: 630.84 lei - 20%
Preț: 634.45 lei - 20%
Preț: 321.17 lei - 20%
Preț: 324.68 lei - 20%
Preț: 631.00 lei - 20%
Preț: 631.31 lei - 20%
Preț: 633.83 lei -
Preț: 377.68 lei - 20%
Preț: 388.30 lei - 20%
Preț: 317.05 lei -
Preț: 371.37 lei - 20%
Preț: 323.23 lei - 20%
Preț: 423.73 lei - 20%
Preț: 321.81 lei - 20%
Preț: 319.13 lei - 20%
Preț: 630.51 lei - 20%
Preț: 325.61 lei - 20%
Preț: 321.17 lei - 20%
Preț: 321.81 lei - 20%
Preț: 325.79 lei - 20%
Preț: 640.83 lei - 20%
Preț: 323.23 lei - 20%
Preț: 325.79 lei - 20%
Preț: 317.68 lei - 20%
Preț: 635.26 lei - 15%
Preț: 623.39 lei - 20%
Preț: 628.32 lei - 20%
Preț: 319.42 lei - 20%
Preț: 324.99 lei - 20%
Preț: 1014.25 lei - 20%
Preț: 804.07 lei - 20%
Preț: 529.54 lei - 20%
Preț: 631.31 lei - 20%
Preț: 1183.08 lei - 20%
Preț: 494.98 lei - 20%
Preț: 388.26 lei - 20%
Preț: 318.67 lei - 20%
Preț: 389.14 lei - 20%
Preț: 323.23 lei - 20%
Preț: 458.73 lei - 20%
Preț: 530.40 lei - 20%
Preț: 388.00 lei - 20%
Preț: 632.09 lei
Preț: 634.01 lei
Preț vechi: 792.51 lei
-20% Nou
Puncte Express: 951
Preț estimativ în valută:
112.21€ • 131.59$ • 98.38£
112.21€ • 131.59$ • 98.38£
Carte tipărită la comandă
Livrare economică 27 ianuarie-10 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789819902712
ISBN-10: 9819902711
Pagini: 558
Ilustrații: XIX, 558 p. 199 illus., 155 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.8 kg
Ediția:1st ed. 2023
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
ISBN-10: 9819902711
Pagini: 558
Ilustrații: XIX, 558 p. 199 illus., 155 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.8 kg
Ediția:1st ed. 2023
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
Cuprins
Cyberspace Security.- Support Tool Selection in Digital Forensics Training.- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication.- A Hybrid Secure Two-party Protocol for Vertical Federated Learning.- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM.- CATS: A serious game in industry towards stronger cloud security.- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing.- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection.- Vulnerability Detection with Representation Learning.- Assessing Vulnerability from Its Description.- Malware Traffic Classification Based on GAN and BP Neural Networks.- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications.- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning.- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study.- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection.- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning.- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety.- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA).- Android Malware Detection: A Literature Review.- Threat Modeling in Cloud Computing - A Literature Review.- A New Signal Packing Algorithm for CAN-FD with Security Consideration.- An Adversarial Sample Defense Method based on Saliency Information.- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning.- Cyberspace Privacy.- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis.- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing.- Encryption Proxies in a Confidential Computing Environment.- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization.- Differentially Private Clustering Algorithm for Mixed Data.- Impact Of Reenactment Programs on Young Generation.- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning.- Cyberspace Anonymity.- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization.- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates.- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things.- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud.- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems.- Short Papers.- Garbage recognition algorithm based on self-attention mechanism and deep sorting.- Approaches for Zero Trust Adoption Based Upon Organization Security Level.- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.