LEADER 04747nam 22007335 450 001 9910484134503321 005 20251113212320.0 010 $a981-16-0422-3 024 7 $a10.1007/978-981-16-0422-5 035 $a(CKB)4100000011759617 035 $a(DE-He213)978-981-16-0422-5 035 $a(MiAaPQ)EBC6476041 035 $a(PPN)253859425 035 $a(EXLCZ)994100000011759617 100 $a20210209d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity in Computing and Communications $e8th International Symposium, SSCC 2020, Chennai, India, October 14?17, 2020, Revised Selected Papers /$fedited by Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun-I Fan 205 $a1st ed. 2021. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (X, 305 p. 33 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1364 311 08$a981-16-0421-5 327 $aPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools -- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure Container Deployment Framework in Edge Computing -- Deep Hierarchical APP Recommendation with Dynamic Behaviors -- New Security Architecture of Access Control in 5G MEC -- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments -- A Survey of Security Attacks on Silicon Based Weak PUF Architectures -- On the Feasibility of DoS Attack on Smart Door Lock IoT Network -- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning -- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection -- Thermal Management in Large Data Centres: Security Threats and Mitigation -- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm -- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data -- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm -- SaaS - Microservices-Based Scalable Smart Contract Architecture -- GIDS: Anomaly Detection Using Generative Adversarial Networks -- Audio Steganography Using Multi LSB and IGS Techniques -- A Forensic Analysis on the Availability of MQTT Network Traffic -- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications -- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment. 330 $aThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1364 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aComputer systems 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aMobile and Network Security 606 $aComputer System Implementation 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer systems. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aMobile and Network Security. 615 24$aComputer System Implementation. 676 $a005.8 702 $aThampi$b Sabu M. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484134503321 996 $aSecurity in Computing and Communications$92256445 997 $aUNINA