top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computational Intelligence and Intelligent Systems : 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers / / edited by Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione
Computational Intelligence and Intelligent Systems : 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers / / edited by Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XV, 737 p. 277 illus.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer simulation
Data mining
Computer communication systems
Special purpose computers
Artificial Intelligence
Simulation and Modeling
Data Mining and Knowledge Discovery
Computer Communication Networks
Special Purpose and Application-Based Systems
ISBN 981-10-0356-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis and theory of evolutionary computation -- Neural network architectures and learning -- Neuro-dynamics and neuro-engineering -- Fuzzy logic and control -- Collective intelligence and hybrid systems -- Deep learning -- Knowledge discovery -- Learning and reasoning.
Record Nr. UNINA-9910255011303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberspace Safety and Security [[electronic resource] ] : 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings / / edited by Sheng Wen, Wei Wu, Aniello Castiglione
Cyberspace Safety and Security [[electronic resource] ] : 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings / / edited by Sheng Wen, Wei Wu, Aniello Castiglione
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 532 p. 182 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-69471-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Detection of lurkers in Online Social Networks -- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications -- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted cloud -- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points -- An Anonymization Method to Improve Data Utility for Classification -- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data -- A Fair Three-party Contract Singing Protocol Based on Blockchain -- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature -- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption -- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch -- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage -- Noisy Smoothing Image Source Identification -- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment -- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks -- Privacy-preserving Comparable Encryption Scheme in Cloud Computing -- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling -- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation -- Trusted Industry Control System based on Hardware Security Module -- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform -- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach -- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM -- A Fibonacci based batch auditing protocol for cloud data -- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance -- An Online Approach to Defeating Return-Oriented-Programming Attacks -- An Improved Authentication Scheme for the Integrated EPR Information System -- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework -- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing -- Predicting Vulnerable Software Components using software network graph -- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands -- A novel image encryption scheme using Josephus permutation and image Filtering -- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy -- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse -- Optimization of Cloud Workow Scheduling Based on Balanced Clustering -- DexPro: A Bytecode Level Code Protection System for Android Applications -- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service -- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage -- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone.  .
Record Nr. UNISA-996465638003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyberspace Safety and Security : 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings / / edited by Sheng Wen, Wei Wu, Aniello Castiglione
Cyberspace Safety and Security : 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings / / edited by Sheng Wen, Wei Wu, Aniello Castiglione
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 532 p. 182 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-69471-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Detection of lurkers in Online Social Networks -- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications -- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted cloud -- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points -- An Anonymization Method to Improve Data Utility for Classification -- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data -- A Fair Three-party Contract Singing Protocol Based on Blockchain -- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature -- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption -- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch -- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage -- Noisy Smoothing Image Source Identification -- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment -- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks -- Privacy-preserving Comparable Encryption Scheme in Cloud Computing -- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling -- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation -- Trusted Industry Control System based on Hardware Security Module -- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform -- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach -- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM -- A Fibonacci based batch auditing protocol for cloud data -- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance -- An Online Approach to Defeating Return-Oriented-Programming Attacks -- An Improved Authentication Scheme for the Integrated EPR Information System -- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework -- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing -- Predicting Vulnerable Software Components using software network graph -- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands -- A novel image encryption scheme using Josephus permutation and image Filtering -- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy -- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse -- Optimization of Cloud Workow Scheduling Based on Balanced Clustering -- DexPro: A Bytecode Level Code Protection System for Android Applications -- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service -- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage -- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone.  .
Record Nr. UNINA-9910484365103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network and System Security [[electronic resource] ] : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Network and System Security [[electronic resource] ] : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 492 p. 167 illus., 117 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Law and legislation
Computer organization
Application software
Software engineering
Artificial intelligence
Systems and Data Security
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Artificial Intelligence
ISBN 3-030-02744-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Record Nr. UNISA-996466321903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 492 p. 167 illus., 117 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Law and legislation
Computer organization
Application software
Software engineering
Artificial intelligence
Systems and Data Security
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems Applications (incl. Internet)
Software Engineering
Artificial Intelligence
ISBN 3-030-02744-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Record Nr. UNINA-9910349386303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui