|
|
|
|
LEADER |
05347nmm a2200457 u 4500 |
001 |
EB002150143 |
003 |
EBX01000000000000001288269 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
230301 ||| eng |
020 |
|
|
|a 9789819902729
|
100 |
1 |
|
|a Wang, Guojun
|e [editor]
|
245 |
0 |
0 |
|a Ubiquitous Security
|h Elektronische Ressource
|b Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers
|c edited by Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani
|
250 |
|
|
|a 1st ed. 2023
|
260 |
|
|
|a Singapore
|b Springer Nature Singapore
|c 2023, 2023
|
300 |
|
|
|a XIX, 558 p. 199 illus., 155 illus. in color
|b online resource
|
505 |
0 |
|
|a Short Papers -- Garbage recognition algorithm based on self-attention mechanism and deep sorting -- Approaches for Zero Trust Adoption Based Upon Organization Security Level -- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network -- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
|
505 |
0 |
|
|a Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing -- Encryption Proxies in a Confidential Computing Environment -- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization -- Differentially Private Clustering Algorithm for Mixed Data -- Impact Of Reenactment Programs on Young Generation -- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning -- Cyberspace Anonymity -- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization -- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates -- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems --
|
505 |
0 |
|
|a Cyberspace Security -- Support Tool Selection in Digital Forensics Training -- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication -- A Hybrid Secure Two-party Protocol for Vertical Federated Learning -- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM -- CATS: A serious game in industry towards stronger cloud security -- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing -- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection -- Vulnerability Detection with Representation Learning -- Assessing Vulnerability from Its Description -- Malware Traffic Classification Based on GAN and BP Neural Networks -- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications -- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning --
|
505 |
0 |
|
|a Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study -- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection -- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning -- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety -- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) -- Android Malware Detection: A Literature Review -- Threat Modeling in Cloud Computing - A Literature Review -- A New Signal Packing Algorithm for CAN-FD with Security Consideration -- An Adversarial Sample Defense Method based on Saliency Information -- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning -- Cyberspace Privacy -- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis --
|
653 |
|
|
|a Computer Application in Social and Behavioral Sciences
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Social sciences / Data processing
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Engineering and Networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Computer engineering
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Choo, Kim-Kwang Raymond
|e [editor]
|
700 |
1 |
|
|a Wu, Jie
|e [editor]
|
700 |
1 |
|
|a Damiani, Ernesto
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Communications in Computer and Information Science
|
028 |
5 |
0 |
|a 10.1007/978-981-99-0272-9
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-99-0272-9?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.3
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers
|