Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy in communicatio...
~
SecureComm (2022 :)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy in communication networks = 18th EAI International Conference, SecureComm 2022, virtual event, October 2022 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy in communication networks/ edited by Fengjun Li ... [et al.].
Reminder of title:
18th EAI International Conference, SecureComm 2022, virtual event, October 2022 : proceedings /
remainder title:
SecureComm 2022
other author:
Li, Fengjun.
corporate name:
SecureComm
Published:
Cham :Springer Nature Switzerland : : 2023.,
Description:
xv, 840 p. :ill. (chiefly color), digital ;24 cm.
[NT 15003449]:
AI for Security -- Classification-Based Anomaly Prediction in XACML Policies -- An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification -- SecureBERT: A Domain-Specific Language Model for Cybersecurity -- CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network -- Towards high transferability on neural network for black-box adversarial attacks -- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy -- Applied Cryptography -- Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature -- MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT -- A Cross-layer Plausibly Deniable Encryption System for Mobile Devices -- Binary Analysis -- Language and platform independent attribution of heterogeneous code -- Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison -- Cost-effective malware classification based on deep active learning -- Blockchain -- CTDRB: Controllable Timed Data Release using Blockchains -- FairBlock: Preventing Blockchain Front-running with Minimal Overheads -- Blockchain-based Ciphertext Policy-hiding Access Control Scheme -- Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers -- Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification -- Cryptography -- TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation -- Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives -- Replicated additive secret sharing with the optimized number of shares -- Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation -- Data Security -- A Random Reversible Watermarking Schefme for Relational Data -- Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks -- Bootstrapping Trust in Community Repository Projects -- Intrusion Detection -- Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection -- Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning -- AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs -- Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks -- Mobile Security -- What Data Do The Google Dialer and Messages Apps On Android Send to Google? -- Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps -- Secure CV2X using COTS Smartphones over LTE Infrastructure -- Network Security -- DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network -- Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation -- PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information -- Privacy -- Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly -- MetaPriv: Acting in Favor of Privacy on Social Media Platforms -- Adversary for Social Good: Leveraging AttributeObfuscating Attack to Protect User Privacy on Social Networks -- Software Security -- No-Fuzz: Efficient Anti-Fuzzing Techniques -- eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense -- Breaking Embedded Software Homogeneity with Protocol Mutations -- Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT) -- A Generalized Unknown Malware Classification -- Research on the Grouping Method of Side-Channel Leakage Detection -- PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-25538-0
ISBN:
9783031255380
Security and privacy in communication networks = 18th EAI International Conference, SecureComm 2022, virtual event, October 2022 : proceedings /
Security and privacy in communication networks
18th EAI International Conference, SecureComm 2022, virtual event, October 2022 : proceedings /[electronic resource] :SecureComm 2022edited by Fengjun Li ... [et al.]. - Cham :Springer Nature Switzerland :2023. - xv, 840 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,4621867-822X ;. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;462..
AI for Security -- Classification-Based Anomaly Prediction in XACML Policies -- An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification -- SecureBERT: A Domain-Specific Language Model for Cybersecurity -- CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network -- Towards high transferability on neural network for black-box adversarial attacks -- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy -- Applied Cryptography -- Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature -- MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT -- A Cross-layer Plausibly Deniable Encryption System for Mobile Devices -- Binary Analysis -- Language and platform independent attribution of heterogeneous code -- Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison -- Cost-effective malware classification based on deep active learning -- Blockchain -- CTDRB: Controllable Timed Data Release using Blockchains -- FairBlock: Preventing Blockchain Front-running with Minimal Overheads -- Blockchain-based Ciphertext Policy-hiding Access Control Scheme -- Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers -- Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification -- Cryptography -- TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation -- Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives -- Replicated additive secret sharing with the optimized number of shares -- Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation -- Data Security -- A Random Reversible Watermarking Schefme for Relational Data -- Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks -- Bootstrapping Trust in Community Repository Projects -- Intrusion Detection -- Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection -- Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning -- AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs -- Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks -- Mobile Security -- What Data Do The Google Dialer and Messages Apps On Android Send to Google? -- Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps -- Secure CV2X using COTS Smartphones over LTE Infrastructure -- Network Security -- DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network -- Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation -- PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information -- Privacy -- Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly -- MetaPriv: Acting in Favor of Privacy on Social Media Platforms -- Adversary for Social Good: Leveraging AttributeObfuscating Attack to Protect User Privacy on Social Networks -- Software Security -- No-Fuzz: Efficient Anti-Fuzzing Techniques -- eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense -- Breaking Embedded Software Homogeneity with Protocol Mutations -- Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT) -- A Generalized Unknown Malware Classification -- Research on the Grouping Method of Side-Channel Leakage Detection -- PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX.
This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT)
ISBN: 9783031255380
Standard No.: 10.1007/978-3-031-25538-0doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security and privacy in communication networks = 18th EAI International Conference, SecureComm 2022, virtual event, October 2022 : proceedings /
LDR
:05720nmm a2200373 a 4500
001
2315601
003
DE-He213
005
20230203135606.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031255380
$q
(electronic bk.)
020
$a
9783031255373
$q
(paper)
024
7
$a
10.1007/978-3-031-25538-0
$2
doi
035
$a
978-3-031-25538-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S446 2022
111
2
$a
SecureComm
$n
(18th :
$d
2022 :
$c
Online)
$3
3628063
245
1 0
$a
Security and privacy in communication networks
$h
[electronic resource] :
$b
18th EAI International Conference, SecureComm 2022, virtual event, October 2022 : proceedings /
$c
edited by Fengjun Li ... [et al.].
246
3
$a
SecureComm 2022
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xv, 840 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-822X ;
$v
462
505
0
$a
AI for Security -- Classification-Based Anomaly Prediction in XACML Policies -- An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification -- SecureBERT: A Domain-Specific Language Model for Cybersecurity -- CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network -- Towards high transferability on neural network for black-box adversarial attacks -- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy -- Applied Cryptography -- Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature -- MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT -- A Cross-layer Plausibly Deniable Encryption System for Mobile Devices -- Binary Analysis -- Language and platform independent attribution of heterogeneous code -- Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison -- Cost-effective malware classification based on deep active learning -- Blockchain -- CTDRB: Controllable Timed Data Release using Blockchains -- FairBlock: Preventing Blockchain Front-running with Minimal Overheads -- Blockchain-based Ciphertext Policy-hiding Access Control Scheme -- Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers -- Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification -- Cryptography -- TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation -- Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives -- Replicated additive secret sharing with the optimized number of shares -- Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation -- Data Security -- A Random Reversible Watermarking Schefme for Relational Data -- Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks -- Bootstrapping Trust in Community Repository Projects -- Intrusion Detection -- Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection -- Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning -- AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs -- Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks -- Mobile Security -- What Data Do The Google Dialer and Messages Apps On Android Send to Google? -- Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps -- Secure CV2X using COTS Smartphones over LTE Infrastructure -- Network Security -- DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network -- Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation -- PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information -- Privacy -- Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly -- MetaPriv: Acting in Favor of Privacy on Social Media Platforms -- Adversary for Social Good: Leveraging AttributeObfuscating Attack to Protect User Privacy on Social Networks -- Software Security -- No-Fuzz: Efficient Anti-Fuzzing Techniques -- eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense -- Breaking Embedded Software Homogeneity with Protocol Mutations -- Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT) -- A Generalized Unknown Malware Classification -- Research on the Grouping Method of Side-Channel Leakage Detection -- PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX.
520
$a
This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT)
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Li, Fengjun.
$3
3628064
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
$v
462.
$3
3628065
856
4 0
$u
https://doi.org/10.1007/978-3-031-25538-0
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9451851
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login