LEADER 06091nam 22006735 450 001 9910364952503321 005 20200630112314.0 010 $a3-030-37228-6 024 7 $a10.1007/978-3-030-37228-6 035 $a(CKB)4100000010013785 035 $a(MiAaPQ)EBC5997062 035 $a(DE-He213)978-3-030-37228-6 035 $a(PPN)242819168 035 $a(EXLCZ)994100000010013785 100 $a20191212d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Communication Networks $e15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I /$fedited by Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (592 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v304 311 $a3-030-37227-8 327 $aTrustless Framework for Iterative Double Auction based on Blockchain -- Towards a Multi-Chain Future of Proof-of-Space -- Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains -- 4 An Enhanced Verifiable Inter-domain Routing Protocol based on Blockchain -- Edge-Assisted CNN Inference over Encrypted Data for Internet of Things -- POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices -- USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework -- Automated IoT Device Fingerprinting Through Encrypted Stream Classification -- Catching Malware -- DeepCG: Classifying Metamorphic Malware through Deep Learning of Call Graphs -- ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation -- Obfusifier: Obfuscation-Resistant Android Malware Detection System -- Closing the Gap with APTs through Semantic Clusters and Automated Cybergames Machine Learning -- Stochastic ADMM Based Distributed Machine Learning with Differential Privacy -- Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis -- Trojan Attack on Deep Generative Models in Autonomous Driving -- FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition Everything Traffic Security -- Towards Forward Secure Internet Traffic -- Traffic-based Automatic Detection of Browser Fingerprinting -- Measuring Tor Relay Popularity -- SoK: ATT&CK Techniques and Trends in Windows -- Malware Communicating Covertly -- Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts -- Victim-Aware Adaptive Covert Channels -- Random Allocation Seed-DSSS Broadcast Communication against Jamming Attacks -- Loss-tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network -- Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs -- Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing -- Location Privacy Issues in the OpenSky Network Crowdsourcing Platform -- Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree -- Deep Analytics -- TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams -- Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks -- Application Transiency: Towards a Fair Trade of Personal Information for Application Services. 330 $aThis two-volume set LNICST 304-305 constitutes the post-conference proceedings of the 15thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2019, held in Orlando, FL, USA, in October 2019. The 38 full and 18 short papers were carefully reviewed and selected from 149 submissions. The papers are organized in topical sections on blockchains, internet of things, machine learning, everything traffic security communicating covertly, let?s talk privacy, deep analysis, systematic theory, bulletproof defenses, blockchains and IoT, security and analytics, machine learning, private, better clouds, ATCS workshop. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v304 606 $aComputer security 606 $aComputer organization 606 $aComputers 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer organization. 615 0$aComputers. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputing Milieux. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 676 $a005.8 (edition:23) 702 $aChen$b Songqing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChoo$b Kim-Kwang Raymond$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFu$b Xinwen$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLou$b Wenjing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMohaisen$b Aziz$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910364952503321 996 $aSecurity and Privacy in Communication Networks$93012314 997 $aUNINA