LEADER 06241nam 22007095 450 001 996466178903316 005 20200630011710.0 010 $a3-030-24900-X 024 7 $a10.1007/978-3-030-24900-7 035 $a(CKB)4100000008707656 035 $a(DE-He213)978-3-030-24900-7 035 $a(MiAaPQ)EBC5927181 035 $a(PPN)238488497 035 $a(EXLCZ)994100000008707656 100 $a20190710d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage$b[electronic resource] $eSpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14?17, 2019, Proceedings /$fedited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XV, 332 p. 127 illus., 97 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v11637 311 $a3-030-24899-2 320 $aIncludes bibliographical references and index. 327 $aThe 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. 330 $aThis book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 ? Security and Privacy of Internet of Things; TSP 2019 ? Trust, Security and Privacy for Emerging Applications; SCS 2019 ? Sensor-Cloud Systems; UbiSafe 2019 ? UbiSafe Computing; ISSR 2019 ? Security in e-Science and e-Research; CMRM 2019 ? Cybersecurity Metrics and Risk Modeling. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v11637 606 $aData protection 606 $aComputer organization 606 $aComputers 606 $aOptical data processing 606 $aArtificial intelligence 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData protection. 615 0$aComputer organization. 615 0$aComputers. 615 0$aOptical data processing. 615 0$aArtificial intelligence. 615 14$aSecurity. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aInformation Systems and Communication Service. 615 24$aImage Processing and Computer Vision. 615 24$aArtificial Intelligence. 676 $a658.478 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFeng$b Jun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBhuiyan$b Md Zakirul Alam$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLu$b Rongxing$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466178903316 996 $aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage$92295526 997 $aUNISA