LEADER 05599nam 22007095 450 001 9910765480703321 005 20231120090533.0 010 $a9783031459337 010 $a3031459334 024 7 $a10.1007/978-3-031-45933-7 035 $a(MiAaPQ)EBC30960631 035 $a(Au-PeEL)EBL30960631 035 $a(DE-He213)978-3-031-45933-7 035 $a(CKB)29019315900041 035 $a(OCoLC)1410957302 035 $a(EXLCZ)9929019315900041 100 $a20231120d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aScience of Cyber Security $e5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11?14, 2023, Proceedings /$fedited by Moti Yung, Chao Chen, Weizhi Meng 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (526 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14299 311 08$aPrint version: Yung, Moti Science of Cyber Security Cham : Springer,c2023 327 $aSession 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model?s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Science of Cyber Security, SciSec 2023, held in Melbourne, VIC, Australia, during July 11?14, 2023. The 21 full papers presented together with 6 short papers were carefully reviewed and selected from 60 submissions. The papers are organized in the topical sections named: ACDroid: Detecting Collusion Applications on Smart Devices; Almost Injective and Invertible Encodings for Jacobi Quartic Curves; Decompilation Based Deep Binary-Source Function Matching. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14299 606 $aInformation storage and retrieval systems 606 $aDatabase management 606 $aData mining 606 $aMachine learning 606 $aApplication software 606 $aInformation Storage and Retrieval 606 $aDatabase Management 606 $aData Mining and Knowledge Discovery 606 $aMachine Learning 606 $aComputer and Information Systems Applications 615 0$aInformation storage and retrieval systems. 615 0$aDatabase management. 615 0$aData mining. 615 0$aMachine learning. 615 0$aApplication software. 615 14$aInformation Storage and Retrieval. 615 24$aDatabase Management. 615 24$aData Mining and Knowledge Discovery. 615 24$aMachine Learning. 615 24$aComputer and Information Systems Applications. 676 $a025.04 700 $aYung$b Moti$01071902 701 $aChen$b Chao$0636283 701 $aMeng$b Weizhi$01067369 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910765480703321 996 $aScience of Cyber Security$93644380 997 $aUNINA LEADER 02753oam 2200517I 450 001 9910163877703321 005 20230810002118.0 010 $a1-315-29779-5 010 $a1-315-29781-7 010 $a1-315-29780-9 024 7 $a10.4324/9781315297811 035 $a(CKB)3710000001051197 035 $a(MiAaPQ)EBC4799847 035 $a(OCoLC)971613374 035 $a(BIP)63375165 035 $a(BIP)65565294 035 $a(EXLCZ)993710000001051197 100 $a20180706e20171964 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aPeoples of Sierra Leone /$fMerran McCulloch 210 1$aLondon ;$aNew York :$cRoutledge,$d2017. 215 $a1 online resource (122 pages) $cillustrations 225 0 $aEthnographic Survey of Africa ;$vVolume 32 300 $aFirst published in 1950 by the International African Institute. Reprinted (unrevised) with supplementary bibliography 1964. 311 08$a1-138-23832-5 311 08$a1-138-23830-9 320 $aIncludes bibliographical references. 327 $aI. Mende and Lokko -- II. Temne, Limba, Susu and Yalunka -- III. Sherbo, Bullom and Krim -- IV. Kono, Vai and Koranko. 330 $aRoutledge is proud to be re-issuing this landmark series in association with the International African Institute. The series, published between 1950 and 1977, brings together a wealth of previously un-co-ordinated material on the ethnic groupings and social conditions of African peoples. Concise, critical and (for its time) accurate, the Ethnographic Survey contains sections as follows: Physical Environment Linguistic Data Demography History & Traditions of Origin Nomenclature Grouping Cultural Features: Religion, Witchcraft, Birth, Initiation, Burial Social & Political Organization: Kinship, Marriage, Inheritance, Slavery, Land Tenure, Warfare & Justice Economy & Trade Domestic Architecture Each of the 50 volumes will be available to buy individually, and these are organized into regional sub-groups: East Central Africa, North-Eastern Africa, Southern Africa, West Central Africa, Western Africa, and Central Africa Belgian Congo. The volumes are supplemented with maps, available to view on routledge.com or available as a pdf from the publishers. 410 0$aEthnographic survey of Africa.$pWestern Africa ;$vpt. 2. 606 $aEthnology$zSierra Leone 607 $aSierra Leone$xCivilization 615 0$aEthnology 676 $a394.909664 700 $aMcCulloch$b Merran.$01022806 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910163877703321 996 $aPeoples of Sierra Leone$92800749 997 $aUNINA