Vai al contenuto principale della pagina

Ubiquitous Security : First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers / / edited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Ubiquitous Security : First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers / / edited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo Visualizza cluster
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Edizione: 1st ed. 2022.
Descrizione fisica: 1 online resource (397 pages)
Disciplina: 005.8
Soggetto topico: Application software
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer crimes
Computer and Information Systems Applications
Cryptology
Mobile and Network Security
Computer Crime
Persona (resp. second.): WangGuojun <1970->
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks -- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning -- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes -- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm -- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem -- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks -- Smart Search over Encrypted Educational Resources in Cloud Storage -- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets -- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media -- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network -- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity -- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System -- Skill Reward for Safe Deep Reinforcement Learning -- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks -- Reliable and Controllable Data Sharing Based on Blockchain,. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN -- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks -- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS) -- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset -- Towards Evaluating the Effectiveness of Botnet Detection Techniques -- A Robust Malware Detection Approach for Android System based on Ensemble Learning -- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals -- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method -- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment -- An Edge-Cloud Collaborative Object Detection System.
Sommario/riassunto: This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
Titolo autorizzato: Ubiquitous security  Visualizza cluster
ISBN: 981-19-0468-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910548170603321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Communications in Computer and Information Science, . 1865-0937 ; ; 1557