Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Science of cyber security = 6th Inte...
~
SciSec (Conference) (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Science of cyber security = 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Science of cyber security/ edited by Jun Zhao, Weizhi Meng.
Reminder of title:
6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024 : proceedings /
remainder title:
SciSec 2024
other author:
Zhao, Jun.
corporate name:
SciSec (Conference)
Published:
Singapore :Springer Nature Singapore : : 2025.,
Description:
xiii, 474 p. :ill. (chiefly color), digital ;24 cm.
[NT 15003449]:
A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. -- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. -- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. -- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. -- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning. -- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. -- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. -- Graph-Based Profiling of Dependency Vulnerability Remediation. -- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. -- An Enhanced Firewall for IoT Security. -- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. -- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. -- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. -- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. -- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. -- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. -- Smart Home Cyber Insurance Pricing. -- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. -- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. -- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. -- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. -- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. -- Integrating CP-ABE and Device Fingerprint into Federated Learning. -- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. -- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-981-96-2417-1
ISBN:
9789819624171
Science of cyber security = 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024 : proceedings /
Science of cyber security
6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024 : proceedings /[electronic resource] :SciSec 2024edited by Jun Zhao, Weizhi Meng. - Singapore :Springer Nature Singapore :2025. - xiii, 474 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,154411611-3349 ;. - Lecture notes in computer science ;15441..
A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. -- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. -- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. -- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. -- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning. -- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. -- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. -- Graph-Based Profiling of Dependency Vulnerability Remediation. -- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. -- An Enhanced Firewall for IoT Security. -- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. -- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. -- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. -- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. -- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. -- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. -- Smart Home Cyber Insurance Pricing. -- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. -- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. -- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. -- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. -- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. -- Integrating CP-ABE and Device Fingerprint into Federated Learning. -- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. -- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.
This book constitutes the refereed proceedings of the 6th International Conference on Science of Cyber Security, SciSec 2024, held in Copenhagen, Denmark, during August 14-16, 2024. The 25 full papers presented here were carefully selected and reviewed from 79 submissions. These papers focus on the recent research, trends and challenges in the emerging field of Cyber Security.
ISBN: 9789819624171
Standard No.: 10.1007/978-981-96-2417-1doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / S35 2024
Dewey Class. No.: 005.8
Science of cyber security = 6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024 : proceedings /
LDR
:03762nmm a2200373 a 4500
001
2408759
003
DE-He213
005
20250304115236.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819624171
$q
(electronic bk.)
020
$a
9789819624164
$q
(paper)
024
7
$a
10.1007/978-981-96-2417-1
$2
doi
035
$a
978-981-96-2417-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
S35 2024
072
7
$a
UNH
$2
bicssc
072
7
$a
UND
$2
bicssc
072
7
$a
COM030000
$2
bisacsh
072
7
$a
UNH
$2
thema
072
7
$a
UND
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S419 2024
111
2
$a
SciSec (Conference)
$n
(6th :
$d
2024 :
$c
Copenhagen, Denmark)
$3
3781544
245
1 0
$a
Science of cyber security
$h
[electronic resource] :
$b
6th International Conference, SciSec 2024, Copenhagen, Denmark, August 14-16, 2024 : proceedings /
$c
edited by Jun Zhao, Weizhi Meng.
246
3
$a
SciSec 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xiii, 474 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15441
505
0
$a
A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching. -- Identifying Ransomware Functions through Microarchitectural Side-channel Analysis. -- STARMAP: Multi-machine Malware Analysis System for Lateral Movement Observation. -- LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis. -- Completeness Analysis of Mobile Apps' Privacy Policies by Using Deep Learning. -- Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. -- Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. -- Graph-Based Profiling of Dependency Vulnerability Remediation. -- Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. -- An Enhanced Firewall for IoT Security. -- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk. -- SVSM-KMS: Safeguarding Keys for Cloud Services with Encrypted Virtualization. -- GNNexPIDS: An Interpretation Method for Provenance-based Intrusion Detection Based on GNNExplainer. -- Performance Evaluation of Lightweight Cryptographic Ciphers on ARM Processor for IoT Deployments. -- AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. -- FAF-BM: An Approach for False Alerts Filtering using BERT Model with Semi-supervised Active Learning. -- Smart Home Cyber Insurance Pricing. -- Exhaustive Exploratory Analysis of Low Degree Maximum Period NLFSRs By Graph Analysis. -- Integrating Consortium Blockchain and Attribute-Based Searchable Encryption for Automotive Threat Intelligence Sharing Model. -- Multi-Modal Multi-Task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification. -- Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning. -- An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response. -- Integrating CP-ABE and Device Fingerprint into Federated Learning. -- Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM. -- Family Similarity-Enhanced Implicit Data Augmentation for Malware Classification.
520
$a
This book constitutes the refereed proceedings of the 6th International Conference on Science of Cyber Security, SciSec 2024, held in Copenhagen, Denmark, during August 14-16, 2024. The 25 full papers presented here were carefully selected and reviewed from 79 submissions. These papers focus on the recent research, trends and challenges in the emerging field of Cyber Security.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Information Storage and Retrieval.
$3
761906
650
2 4
$a
Database Management.
$3
891010
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
898250
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Zhao, Jun.
$3
1263328
700
1
$a
Meng, Weizhi.
$3
3453375
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15441.
$3
3781545
856
4 0
$u
https://doi.org/10.1007/978-981-96-2417-1
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9514257
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 S35 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login