LEADER 03920nam 22005655 450 001 9910299950203321 005 20201229132432.0 010 $a3-319-76451-9 024 7 $a10.1007/978-3-319-76451-1 035 $a(CKB)4100000002892466 035 $a(MiAaPQ)EBC5344809 035 $a(DE-He213)978-3-319-76451-1 035 $a(PPN)225551969 035 $a(EXLCZ)994100000002892466 100 $a20180328d2018 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity with Intelligent Computing and Big-data Services /$fedited by Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (377 pages) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v733 311 $a3-319-76450-0 327 $aA Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space -- Compact Cat Swarm Optimization Algorithm -- An Extension of Attack Trees -- History Management for Network Information of IoT Devices -- Strategies to Improve Auditing Performance and Soundness for Could Computation -- A Generic Web Application Testing and Attack Data Generation Method. . 330 $aIn the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions. 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v733 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aData protection 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aData protection. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aSecurity. 676 $a005.8 702 $aPeng$b Sheng-Lung$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Shiuh-Jeng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBalas$b Valentina Emilia$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhao$b Ming$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910299950203321 996 $aSecurity with Intelligent Computing and Big-data Services$92079538 997 $aUNINA