top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applications and Techniques in Information Security [[electronic resource] ] : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Applications and Techniques in Information Security [[electronic resource] ] : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (311 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Artificial intelligence
Computer networks
Education—Data processing
Computer engineering
Data and Information Security
Artificial Intelligence
Computer Communication Networks
Computers and Education
Computer Engineering and Networks
Soggetto non controllato Computer Security
Computers
ISBN 981-9922-64-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach.
Record Nr. UNISA-996546832503316
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (311 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Artificial intelligence
Computer networks
Education—Data processing
Computer engineering
Data and Information Security
Artificial Intelligence
Computer Communication Networks
Computers and Education
Computer Engineering and Networks
Soggetto non controllato Computer Security
Computers
ISBN 981-9922-64-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach.
Record Nr. UNINA-9910726296103321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and techniques in information security : 11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings / / edited by Lejla Batina, Gang Li
Applications and techniques in information security : 11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings / / edited by Lejla Batina, Gang Li
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer, , [2020]
Descrizione fisica 1 online resource (IX, 123 p. 33 illus., 21 illus. in color.)
Disciplina 929.605
Collana Communications in Computer and Information Science
Soggetto topico Computer networks - Security measures
Computer security
ISBN 981-334-706-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. .
Record Nr. UNISA-996465452603316
Singapore : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applications and techniques in information security : 11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings / / edited by Lejla Batina, Gang Li
Applications and techniques in information security : 11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings / / edited by Lejla Batina, Gang Li
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer, , [2020]
Descrizione fisica 1 online resource (IX, 123 p. 33 illus., 21 illus. in color.)
Disciplina 929.605
Collana Communications in Computer and Information Science
Soggetto topico Computer networks - Security measures
Computer security
ISBN 981-334-706-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. .
Record Nr. UNINA-9910427694603321
Singapore : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings / / edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li
Applications and Techniques in Information Security : 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings / / edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XI, 313 p. 157 illus., 101 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computers—Law and legislation
Information technology—Law and legislation
Artificial intelligence
Application software
Computer networks
Data and Information Security
Legal Aspects of Computing
Artificial Intelligence
Computer and Information Systems Applications
Computer Communication Networks
ISBN 981-15-0871-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. .
Record Nr. UNINA-9910357850203321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings / / edited by Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings / / edited by Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 223 p. 65 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data mining
Artificial intelligence
Data encryption (Computer science)
Systems and Data Security
Data Mining and Knowledge Discovery
Artificial Intelligence
Cryptology
ISBN 981-13-2907-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Security -- Information Abuse Prevention -- Security Implementations -- Knowledge Discovery -- Applications.
Record Nr. UNINA-9910299295503321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings / / edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings / / edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 223 p. 68 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 981-10-5421-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security.
Record Nr. UNINA-9910254820103321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings / / edited by Lynn Batten, Gang Li
Applications and Techniques in Information Security : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings / / edited by Lynn Batten, Gang Li
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 163 p. 30 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 981-10-2741-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy.
Record Nr. UNINA-9910254987403321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten
Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVII, 398 p. 147 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data encryption (Computer science)
Algorithms
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 3-662-48683-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Invited Speeches -- Memory Scrapper Attacks - Threats and Mitigations -- A Simple and Provable Secure (Authenticated) Key Exchange Based on LWE -- Contents -- Cryptograph -- An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map -- Abstract -- 1 Introduction -- 2 Basic Theory of the Proposed Algorithm -- 2.1 Zigzag Transformation -- 2.2 3-Dimension Logistic Chaotic Map -- 3 Algorithm Described -- 4 Simulation Result -- 5 The Security Analysis -- 5.1 Resistance to Exhaustive Attack -- 5.1.1 Analysis of Key Space -- 5.1.2 Keys' Sensitivity Analysis -- 5.2 Resistance to Statistical Attack -- 5.2.1 The Grey Histogram Analysis -- 5.2.2 Correlation Coefficient Analysis -- 5.3 Information Entropy Analysis -- 5.4 Compare the Efficiency of Encryption and Decryption -- 6 Conclusion -- Acknowledgements -- References -- An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme -- 1 Introduction -- 2 Preliminaries -- 3 Security Analysis of Liang et al.'s CR-IB-PRE Scheme -- 4 Syntax and Security Definition for CR-IB-PRE Scheme -- 5 Our Improved CR-IB-PRE Scheme -- 6 Security and Efficiency Analysis -- 7 Conclusion -- References -- Cryptographic Public Key Length Prediction -- Abstract -- 1 Introduction -- 2 Key Length Prediction -- 2.1 Lenstra and Verheul Equations -- 2.2 Lenstra Update Equations -- 2.3 The Network Working Group RFC3766 -- 2.4 ECRYPT and ECRYPT II -- 2.5 Nist -- 2.6 Anssi -- 2.7 BSI -- 3 Moore's Law -- 4 Experiments and Environment -- 5 Summary and Conclusions -- References -- An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation -- 1 Introduction -- 2 Chaos Theory -- 3 Baker's Transformation -- 4 Encryption Methodology -- 5 Experimental Results and Analysis -- 5.1 Experimental Results -- 5.2 Experimental Analysis.
6 Conclusion -- References -- Quantum Differential Cryptanalysis to the Block Ciphers -- 1 Introduction -- 2 Preliminaries -- 2.1 Classical Differential Cryptanalysis -- 2.2 The Bernstein--Vazirani Algorithm -- 2.3 Results After Running the Bernstein--Vazirani Algorithm -- 3 Quantum Algorithm to Execute Differential Cryptanalysis -- 3.1 The First Method -- 3.2 The Second Method -- 4 Discussions and Conclusions -- References -- An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes o ... -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 VPN -- 2.2 Platform Security Attributes -- 2.3 Attribute Based Encryption -- 3 Problem Definition -- 3.1 Our Goals -- 3.2 Threat Model and Assumptions -- 4 Design -- 4.1 Authentication Scheme Overview -- 4.2 Platform Attributes Extraction -- 4.3 Security Requirements Classification -- 5 Implementation -- 5.1 Platform Attributes Expression -- 5.2 Remote Authentication Framework -- 5.3 ABE Based Authentication -- 5.4 Trusted Computing Based Attributes -- 6 Analysis -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Conclusion -- References -- Public Key Timed-Release Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Complexity Assumptions -- 3 PKTRABE: Definitions -- 4 Construction 1: Single Time Server -- 4.1 Description of the Scheme -- 4.2 Security of the Scheme -- 5 Construction 2: Multiple Time Servers -- 5.1 Description of the Scheme -- 5.2 Security of the Scheme -- 6 Conclusions and Future Work -- References -- Color Image Encryption in CIE L*a*b* Space -- 1 Introduction -- 2 Previous Work -- 3 Preliminaries -- 3.1 1D Logistic Map -- 3.2 2D Arnold's Cat Map -- 3.3 3D Lu Map -- 4 Color Image Encryption in L*a*b* -- 4.1 Color Conversion.
4.2 The L* Channel -- 4.3 The A* and B* Channel -- 5 Simulation Results -- 6 Security and Performance Analysis -- 6.1 Resistance to the Brute-Force Attack -- 6.2 Resistance to the Statistic Attack -- 6.3 The Speed of the Encryption and Decryption -- 7 Conclusion and Discussion -- References -- Evaluation, Standards and Protocols -- Discover Abnormal Behaviors Using HTTP Header Fields Measurement -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Discovery of Abnormal Behaviors -- 2.2 Automatic Discovery of Protocol Format -- 3 Methodology -- 4 Experiments and Results -- 4.1 Environment -- 4.2 The Basic Statistical Analysis of HTTP Header Field -- 4.3 The Mining Analysis of HTTP Header Field Order -- 4.4 Recognize Abnormal HTTP Flow -- 5 Conclusions -- Acknowledgements -- References -- Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis -- 1 Introduction -- 2 Overview of the OpenID Protocol -- 3 Modeling Protocols in TLA+ -- 3.1 General Flow -- 3.2 Protocol Specification -- 4 Experimental Results and Discussion -- 5 Defense Mechanisms -- 6 Conclusion -- References -- A Lightweight Code-Based Authentication Protocol for RFID Systems -- 1 Introduction -- 2 Related Work -- 3 Error Correction Code (ECC) -- 4 Our Proposed Protocol -- 4.1 QC-MDPC McEliece Encryption -- 4.2 Initialization -- 4.3 Authentication -- 5 Security Analysis -- 6 Performance Analysis -- 7 Conclusion -- References -- An Overview of Ad Hoc Network Security -- Abstract -- 1 Introduction -- 2 Existing Typical Schemes -- 2.1 Threshold Mechanism Schemes -- 2.2 Self-organized Mechanism Schemes -- 2.3 Id-Based Mechanism Schemes -- 2.4 Cluster-Based Mechanism Schemes -- 3 The Comparisons of Those Schemes -- 4 Further Study -- 4.1 A Bi-directional Trust Model -- 4.2 A Trust Model with Parameter -- 5 Conclusions -- References.
Trust Computing and Privacy Protection -- Structural Analysis of IWA Social Network -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Basic Concept of IWA Social Network -- 3.2 IWA Social Network Construction -- 3.3 Community Detection Algorithm -- 4 Experiment -- 4.1 Data Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- A Differentially Private Method for Reward-Based Spatial Crowdsourcing -- 1 Introduction -- 2 Related Work and Background -- 2.1 Related Work -- 2.2 Differential Privacy -- 3 Differentially Private Method -- 3.1 Problem Definition -- 3.2 Building Contour Plot with DP -- 3.3 Task Assignment -- 4 Experiments -- 4.1 Settings -- 4.2 Experiment Results and Comparisons -- 5 Conclusions -- References -- Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data -- Abstract -- 1 Introduction and Motivations -- 2 Measurement Methodology -- 2.1 Overview of Data Sets -- 2.2 Measurement Metrics -- 2.3 Measurement Framework -- 3 Measurement Result -- 3.1 HTTP and HTTPS Performance -- 3.2 FTP Performance -- 3.3 SSH Performance -- 3.4 SMTP Performance -- 4 Conclusion and Future Works -- References -- Trust Prediction with Trust Antecedent Framework Regularization -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Matrix Factorization Model for Trust Prediction -- 4 Modeling Trust Antecedent Framework for Trust Prediction -- 4.1 Factors of Perceived Trustworthiness -- 4.2 The Proposed Framework: tafTrust -- 5 Experiments -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Comparison Methods and Details -- 5.4 Impact of Parameter gamma -- 6 Conclusion and Future Work -- Acknowledgments -- References -- Trust Prediction Based on Interactive Relations Strength -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Trust Prediction Framework.
3.1 Modeling Relational Strength in Fields -- 3.2 Trust Prediction Model -- 4 Experiments and Evaluation -- 4.1 Dataset and Evaluation Method -- 4.2 Comparison of Different Trust Predictors -- 5 Conclusions -- Acknowledgments -- References -- Cloud Security and Applications -- You Can't Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud -- Abstract -- 1 Introduction -- 2 Related Works -- 3 A Novel Methodology of Defending DDoS Attack Based on Botcloud -- 3.1 Identifying Attack Flows -- 3.2 Tracebacking Malicious Processes -- 4 Experiments and Analysis -- 4.1 Experimental Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion and Future Works -- References -- Quantitative Evaluation Method of Cloud Security -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Cloud Security Indicator System -- 3.1 Principles of Building of Indicator System -- 3.2 Architecture of the Indicator System -- 4 Quantitative Assessment of Cloud Security -- 4.1 Multi-attribute Decision Making Indicator System -- 4.2 Normalization of Decision-Making Index -- 4.3 Multi-attribute Decision-Making -- 5 Example of Quantitative Analysis -- 5.1 Security Evaluation Module -- 5.2 Quantization Evaluation -- 6 Summary -- References -- A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing -- Abstract -- 1 Introduction -- 2 Construction of Large-Scale Distributed Sorting Platform -- 2.1 Business Logic Design -- 2.1.1 Business Logic Design of Host -- 2.1.2 Business Logic Design of Working Machine -- 3 Large-Scale Distributed Sorting Algorithm Design -- 3.1 Large-Scale Distributed Sorting Algorithm Design of Host -- 3.1.1 Data Distribution Based on Constraint of the Number of Working Machine -- 3.1.2 Task Distribution Based on Constraint of Free Time -- 3.2 Large-Scale Distributed Sorting Algorithm Design of Working Machine.
4 Implementation and Validation of Algorithm.
Record Nr. UNINA-9910298961303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications and Techniques in Information Security : International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings / / edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren
Applications and Techniques in Information Security : International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings / / edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 266 p. 120 illus.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data encryption (Computer science)
Systems and Data Security
Cryptology
ISBN 3-662-45670-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations.
Record Nr. UNINA-9910298977603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui