LEADER 04420nam 22005295 450 001 9910483495003321 005 20200703235754.0 010 $a3-030-17065-9 024 7 $a10.1007/978-3-030-17065-3 035 $a(CKB)4100000007881272 035 $a(MiAaPQ)EBC5754736 035 $a(DE-He213)978-3-030-17065-3 035 $a(PPN)243766149 035 $a(EXLCZ)994100000007881272 100 $a20190409d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)$b[electronic resource] /$fedited by Ana Maria Madureira, Ajith Abraham, Niketa Gandhi, Catarina Silva, Mário Antunes 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (409 pages) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v942 311 $a3-030-17064-0 327 $aAn E?cient and Secure Forward Error Correcting Scheme for DNA Data Storage -- A Blockchain-based Scheme for Access Control in e-Health Scenarios -- Blockchain-based PKI for Crowdsourced IoT Sensor Information -- The Design of a Cloud Forensics Middleware System Base on Memory Analysis -- Privacy Enhancement of Telecom Processes Interacting with Charging Data Records -- Warning of A?ected Users About an Identity Leak -- Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities? Network Devices -- A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment -- A survey of blockchain frameworks and applications -- Filtering Email Addresses, Credit Card Numbers and searching for Bitcoin Artifacts with the Autopsy Digital Forensics Software -- A survey on the use of data points in IDS research -- Cybersecurity and digital forensics ? course development in a higher education institution -- Model Driven Architectural Design of Information Security System -- An Automated System for Criminal Police Reports Analysis -- Detecting Internet-Scale Tra?c Redirection Attacks using Latent Class Models -- Passive Video Forgery Detection Considering Spatio-Temporal Consistency. 330 $aThis book highlights recent research on Soft Computing, Pattern Recognition, Information Assurance and Security. It presents 38 selected papers from the 10th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018) and the 14th International Conference on Information Assurance and Security (IAS 2018) held at Instituto Superior de Engenharia do Porto (ISEP), Portugal during December 13?15, 2018. SoCPaR ? IAS 2018 is a premier conference and brings together researchers, engineers and practitioners whose work involves soft computing and information assurance and their applications in industry and the real world. Including contributions by authors from over 25 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering. . 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5357 ;$v942 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 676 $a006.3 702 $aMadureira$b Ana Maria$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAbraham$b Ajith$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGandhi$b Niketa$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSilva$b Catarina$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAntunes$b Mário$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483495003321 996 $aProceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)$92851661 997 $aUNINA