Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy in communicatio...
~
International Conference on Security and Privacy in Communication Networks (2023 :)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy in communication networks = 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.. Part II /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy in communication networks/ edited by Haixin Duan ... [et al.].
Reminder of title:
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.
remainder title:
SecureComm 2023
other author:
Duan, Haixin.
corporate name:
International Conference on Security and Privacy in Communication Networks
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xvii, 517 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Intrusion and Anomaly Detection -- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent -- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions -- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks -- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification -- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security -- Enhancing Cross Device Security with Fine Grained Permission Control -- The Security Analysis of ROS2 Communication -- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security -- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network -- Securing Web Inputs using Parallel Session Attachments -- Unsupervised and Adaptive Tor Website Fingerprinting -- Visibility of Scan Traffic Trends in Sparsely Populated Darknets -- Privacy -- Do Backdoors Assist Membership Inference Attacks -- Efficient and Scalable Multi Party Privacy Preserving k NN Classification -- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter -- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds -- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks -- Split Without a Leak Reducing Privacy Leakage in Split Learning -- Street Rep A Privacy Preserving Reputation Aggregation System -- Program Analysis -- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis -- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features -- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution -- Ransomware as a Service Demystifying Android Ransomware Generators -- Software Security -- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing -- Learning AI coding style for software plagiarism detection -- Understanding and Measuring Inter Process Code Injection in Windows Malware.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-64954-7
ISBN:
9783031649547
Security and privacy in communication networks = 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.. Part II /
Security and privacy in communication networks
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.Part II /[electronic resource] :SecureComm 2023edited by Haixin Duan ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xvii, 517 p. :ill. (some col.), digital ;24 cm. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,5681867-822X ;. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;568..
Intrusion and Anomaly Detection -- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent -- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions -- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks -- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification -- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security -- Enhancing Cross Device Security with Fine Grained Permission Control -- The Security Analysis of ROS2 Communication -- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security -- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network -- Securing Web Inputs using Parallel Session Attachments -- Unsupervised and Adaptive Tor Website Fingerprinting -- Visibility of Scan Traffic Trends in Sparsely Populated Darknets -- Privacy -- Do Backdoors Assist Membership Inference Attacks -- Efficient and Scalable Multi Party Privacy Preserving k NN Classification -- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter -- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds -- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks -- Split Without a Leak Reducing Privacy Leakage in Split Learning -- Street Rep A Privacy Preserving Reputation Aggregation System -- Program Analysis -- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis -- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features -- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution -- Ransomware as a Service Demystifying Android Ransomware Generators -- Software Security -- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing -- Learning AI coding style for software plagiarism detection -- Understanding and Measuring Inter Process Code Injection in Windows Malware.
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
ISBN: 9783031649547
Standard No.: 10.1007/978-3-031-64954-7doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security and privacy in communication networks = 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.. Part II /
LDR
:04113nmm a2200349 a 4500
001
2407702
003
DE-He213
005
20241014125736.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031649547
$q
(electronic bk.)
020
$a
9783031649530
$q
(paper)
024
7
$a
10.1007/978-3-031-64954-7
$2
doi
035
$a
978-3-031-64954-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2023
111
2
$a
International Conference on Security and Privacy in Communication Networks
$n
(19th :
$d
2023 :
$c
Hong Kong, China)
$3
3779682
245
1 0
$a
Security and privacy in communication networks
$h
[electronic resource] :
$b
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.
$n
Part II /
$c
edited by Haixin Duan ... [et al.].
246
3
$a
SecureComm 2023
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xvii, 517 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-822X ;
$v
568
505
0
$a
Intrusion and Anomaly Detection -- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent -- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions -- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks -- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification -- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security -- Enhancing Cross Device Security with Fine Grained Permission Control -- The Security Analysis of ROS2 Communication -- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security -- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network -- Securing Web Inputs using Parallel Session Attachments -- Unsupervised and Adaptive Tor Website Fingerprinting -- Visibility of Scan Traffic Trends in Sparsely Populated Darknets -- Privacy -- Do Backdoors Assist Membership Inference Attacks -- Efficient and Scalable Multi Party Privacy Preserving k NN Classification -- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter -- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds -- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks -- Split Without a Leak Reducing Privacy Leakage in Split Learning -- Street Rep A Privacy Preserving Reputation Aggregation System -- Program Analysis -- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis -- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features -- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution -- Ransomware as a Service Demystifying Android Ransomware Generators -- Software Security -- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing -- Learning AI coding style for software plagiarism detection -- Understanding and Measuring Inter Process Code Injection in Windows Malware.
520
$a
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Duan, Haixin.
$3
3779680
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
$v
568.
$3
3779683
856
4 0
$u
https://doi.org/10.1007/978-3-031-64954-7
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9513200
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login