Dependability in Sensor, Cloud, and Big Data Systems and Applications : 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings / / edited by Guojun Wang, Md Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVIII, 488 p. 175 illus., 126 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer communication systems Special purpose computers Architecture, Computer Coding theory Information theory Database management Systems and Data Security Computer Communication Networks Special Purpose and Application-Based Systems Computer System Implementation Coding and Information Theory Database Management |
ISBN | 981-15-1304-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Dependability and Security Fundamentals and Technologies -- Dependable and Secure Systems -- Dependable and Secure Applications -- Dependability and Security Measures and Assessments -- Explainable Artificial Inteligence for Cyberspace. |
Record Nr. | UNINA-9910357849003321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 332 p. 127 illus., 97 illus. in color.) |
Disciplina | 658.478 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computer organization Computers Optical data processing Artificial intelligence Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Image Processing and Computer Vision Artificial Intelligence |
ISBN | 3-030-24900-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. |
Record Nr. | UNISA-996466178903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 506 p. 317 illus., 142 illus. in color.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computers Computer organization Artificial intelligence Security Computing Milieux Information Systems and Communication Service Computer Systems Organization and Communication Networks Artificial Intelligence |
ISBN | 3-030-24907-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. |
Record Nr. | UNISA-996466179403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage : 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 506 p. 317 illus., 142 illus. in color.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computers Computer organization Artificial intelligence Security Computing Milieux Information Systems and Communication Service Computer Systems Organization and Communication Networks Artificial Intelligence |
ISBN | 3-030-24907-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. |
Record Nr. | UNINA-9910349311303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 332 p. 127 illus., 97 illus. in color.) |
Disciplina |
658.478
005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computer organization Computers Optical data processing Artificial intelligence Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Image Processing and Computer Vision Artificial Intelligence |
ISBN | 3-030-24900-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. |
Record Nr. | UNINA-9910349311403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|