語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ subject: ]
切換:
標籤
|
MARC模式
|
ISBD
Network and system security = 16th I...
~
International Conference on Network and System Security (2022 :)
FindBook
Google Book
Amazon
博客來
Network and system security = 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Network and system security/ edited by Xingliang Yuan ... [et al.].
其他題名:
16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /
其他題名:
NSS 2022
其他作者:
Yuan, Xingliang.
團體作者:
International Conference on Network and System Security
出版者:
Cham :Springer Nature Switzerland : : 2022.,
面頁冊數:
xv, 747 p. :ill. (some col.), digital ;24 cm.
內容註:
AI for Network Security -- Vulnerability Detection Using Deep Learning Based Function Classification -- RAIDER: Reinforcement-aided Spear Phishing Detector -- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning -- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics -- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection -- Network Security -- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection -- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches -- Reducing Intrusion Alert Trees to Aid Visualization -- Attacker Attribution Through Characteristics Inference Using Honeypot Data -- Detecting Contradictions from CoAP RFC Based on Knowledge Graph -- Mobile Security -- A First Look at Android Apps' Third-party Resources Loading -- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset -- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices -- A Beyond-5G Authentication and Key Agreement Protocol -- IoT Security -- A Survey on IoT Vulnerability Discovery -- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks -- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks -- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection -- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset -- Privacy-Preserving Machine Learning Protocols and Systems -- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning -- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication -- An Efficient Clustering-Based Privacy-Preserving Recommender System -- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks -- Privacy-Preserving Networked Systems and Protocols -- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server -- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare -- Enabling Secure Deduplication in Encrypted Decentralized Storage -- Geometric Range Searchable Encryption with Forward and Backward Security -- Blockchain Security -- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach -- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts -- BSB: Bringing Safe Browsing to Blockchain Platform -- Blockchain-Powered Systems -- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks -- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction -- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment -- Decentralized Access Control for Secure Microservices Cooperation with Blockchain -- Blockchain-Based Access Control for Smart Manufacturer Secure Management System -- Attacks -- Driver Locations Harvesting Attack on pRide -- Rebound Attacks on SKINNY Hashing with Automatic Tools -- Combination Reduction Algorithms and its Application to Subversion Attack -- Cryptographic Algorithms and Protocols -- Evaluating the Security of Merkle-Damg˚ard Hash Functions and Combiners in Quantum Settings -- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security -- Strengthening the Security of AES Against Differential Fault Attack.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures -
電子資源:
https://doi.org/10.1007/978-3-031-23020-2
ISBN:
9783031230202
Network and system security = 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /
Network and system security
16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /[electronic resource] :NSS 2022edited by Xingliang Yuan ... [et al.]. - Cham :Springer Nature Switzerland :2022. - xv, 747 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,137870302-9743 ;. - Lecture notes in computer science ;13787..
AI for Network Security -- Vulnerability Detection Using Deep Learning Based Function Classification -- RAIDER: Reinforcement-aided Spear Phishing Detector -- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning -- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics -- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection -- Network Security -- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection -- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches -- Reducing Intrusion Alert Trees to Aid Visualization -- Attacker Attribution Through Characteristics Inference Using Honeypot Data -- Detecting Contradictions from CoAP RFC Based on Knowledge Graph -- Mobile Security -- A First Look at Android Apps' Third-party Resources Loading -- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset -- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices -- A Beyond-5G Authentication and Key Agreement Protocol -- IoT Security -- A Survey on IoT Vulnerability Discovery -- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks -- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks -- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection -- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset -- Privacy-Preserving Machine Learning Protocols and Systems -- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning -- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication -- An Efficient Clustering-Based Privacy-Preserving Recommender System -- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks -- Privacy-Preserving Networked Systems and Protocols -- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server -- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare -- Enabling Secure Deduplication in Encrypted Decentralized Storage -- Geometric Range Searchable Encryption with Forward and Backward Security -- Blockchain Security -- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach -- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts -- BSB: Bringing Safe Browsing to Blockchain Platform -- Blockchain-Powered Systems -- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks -- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction -- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment -- Decentralized Access Control for Secure Microservices Cooperation with Blockchain -- Blockchain-Based Access Control for Smart Manufacturer Secure Management System -- Attacks -- Driver Locations Harvesting Attack on pRide -- Rebound Attacks on SKINNY Hashing with Automatic Tools -- Combination Reduction Algorithms and its Application to Subversion Attack -- Cryptographic Algorithms and Protocols -- Evaluating the Security of Merkle-Damg˚ard Hash Functions and Combiners in Quantum Settings -- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security -- Strengthening the Security of AES Against Differential Fault Attack.
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022. The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
ISBN: 9783031230202
Standard No.: 10.1007/978-3-031-23020-2doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Network and system security = 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /
LDR
:05354nmm a2200373 a 4500
001
2306802
003
DE-He213
005
20221206073456.0
006
m d
007
cr nn 008maaau
008
230421s2022 sz s 0 eng d
020
$a
9783031230202
$q
(electronic bk.)
020
$a
9783031230196
$q
(paper)
024
7
$a
10.1007/978-3-031-23020-2
$2
doi
035
$a
978-3-031-23020-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2022
111
2
$a
International Conference on Network and System Security
$n
(16th :
$d
2022 :
$c
Denarau Island, Fiji)
$3
3611373
245
1 0
$a
Network and system security
$h
[electronic resource] :
$b
16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /
$c
edited by Xingliang Yuan ... [et al.].
246
3
$a
NSS 2022
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2022.
300
$a
xv, 747 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13787
505
0
$a
AI for Network Security -- Vulnerability Detection Using Deep Learning Based Function Classification -- RAIDER: Reinforcement-aided Spear Phishing Detector -- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning -- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics -- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection -- Network Security -- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection -- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches -- Reducing Intrusion Alert Trees to Aid Visualization -- Attacker Attribution Through Characteristics Inference Using Honeypot Data -- Detecting Contradictions from CoAP RFC Based on Knowledge Graph -- Mobile Security -- A First Look at Android Apps' Third-party Resources Loading -- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset -- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices -- A Beyond-5G Authentication and Key Agreement Protocol -- IoT Security -- A Survey on IoT Vulnerability Discovery -- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks -- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks -- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection -- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset -- Privacy-Preserving Machine Learning Protocols and Systems -- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning -- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication -- An Efficient Clustering-Based Privacy-Preserving Recommender System -- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks -- Privacy-Preserving Networked Systems and Protocols -- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server -- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare -- Enabling Secure Deduplication in Encrypted Decentralized Storage -- Geometric Range Searchable Encryption with Forward and Backward Security -- Blockchain Security -- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach -- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts -- BSB: Bringing Safe Browsing to Blockchain Platform -- Blockchain-Powered Systems -- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks -- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction -- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment -- Decentralized Access Control for Secure Microservices Cooperation with Blockchain -- Blockchain-Based Access Control for Smart Manufacturer Secure Management System -- Attacks -- Driver Locations Harvesting Attack on pRide -- Rebound Attacks on SKINNY Hashing with Automatic Tools -- Combination Reduction Algorithms and its Application to Subversion Attack -- Cryptographic Algorithms and Protocols -- Evaluating the Security of Merkle-Damg˚ard Hash Functions and Combiners in Quantum Settings -- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security -- Strengthening the Security of AES Against Differential Fault Attack.
520
$a
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022. The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
700
1
$a
Yuan, Xingliang.
$3
3531421
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13787.
$3
3611374
856
4 0
$u
https://doi.org/10.1007/978-3-031-23020-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9447762
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入
(1)帳號:一般為「身分證號」;外籍生或交換生則為「學號」。 (2)密碼:預設為帳號末四碼。
帳號
.
密碼
.
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)