The Ecosystem of e-Business: Technologies, Stakeholders, and Connections : 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers / / edited by Jennifer J. Xu, Bin Zhu, Xiao Liu, Michael J. Shaw, Han Zhang, Ming Fan |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 199 p. 29 illus., 19 illus. in color.) |
Disciplina | 658.8720285 |
Collana | Lecture Notes in Business Information Processing |
Soggetto topico |
Electronic commerce
Information technology - Management Application software Data protection - Law and legislation Machine learning e-Commerce and e-Business E-Business Computer Application in Administrative Data Processing Computer and Information Systems Applications Privacy Machine Learning |
ISBN | 3-030-22784-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Social, Policy, and Privacy Issues -- Impact of Social Media on Real Estate Sales -- An Ecological Business Model for Intelligent Operation and Maintenance of Urban Infrastructure -- Data-Driven Business Models and Professional Services Firms: A Strategic Framework and Transitionary Pathways -- Impacts of Information Provision and Visualization on Collaborative Decision Making -- Why Monetary Gift Giving? The Role of Immediacy and Social Interactivity -- Revealing the Black Box of Privacy Concern: Understanding How Self-disclosure Affects Privacy Concern in the Context of On-demand Services through Two Competing Models -- e-Market -- Competitive Analysis of “Buy Online and Pick Up in Store” Channel -- An Empirical Analysis of Brand Effects on Online Consumer Repurchase Behavior after Unsatisfied Experience -- How to Sell Your House for More -- How Do Novice Consumers Learn from Online Expert Reviews -- FinTech -- An Empirical Investigation of Equity-based crowdfunding Campaigns in the United States -- How Content Features of Charity Crowdfunding Projects Attract Potential Donors? Empirical Study of the Role of Project Images and Texts -- Do Achievement Goals and Work Nature Affect Contributor Performance in Gamified Crowdsourcing? An Exploratory Study in an Academic Setting -- Is a Blockchain-based Game a Game for Fun or a Tool for Speculation? An Empirical Analysis of Player Behavior in Crypokitties -- Artificial Intelligence -- You Are Not You When You Are Hungry: Machine Learning Investigation of Impact of Ratings on Ratee Decision Making -- Ensemble Classification Method for Imbalanced Data Using Deep Learning -- Color Trend Forecasting with Emojis -- Artificial Intelligence (AI) and Cognitive Apportionment for Service Flexibility -- How Long Will Your Videos Remain Popular? Empirical Study of the Impact of Video Features on YouTube Trending Using Deep Learning Methodologies. |
Record Nr. | UNINA-9910337561703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Encrypted Network Traffic Analysis |
Autore | Cherukuri Aswani Kumar |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (108 pages) |
Altri autori (Persone) |
IkramSumaiya Thaseen
LiGang LiuXiao |
Collana | SpringerBriefs in Computer Science Series |
ISBN | 3-031-62909-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Preface -- Acknowledgements -- Contents -- Chapter 1: Introduction -- 1.1 Security in TCP/IP -- 1.2 Security at the Network Layer -- 1.3 Security at Transport Layer -- 1.4 Security at Application Layer -- 1.5 Security Implementations in Other TCP/IP Networks -- 1.6 Network Traffic Analysis -- 1.7 Challenges Involved in Network Traffic Analysis -- 1.8 Conclusions -- References -- Chapter 2: Encrypted Network Traffic Analysis -- 2.1 Introduction -- 2.2 ENTA Methodology -- 2.3 Purpose of the Analysis -- 2.4 Collection of Traffic Data and Preprocessing -- 2.5 Feature Selection and Extraction -- 2.5.1 Packet-Based Features -- 2.5.1.1 Flow-Based Features -- 2.5.2 Session-Based Features -- 2.5.3 Host-Based Features -- 2.6 Techniques for ENTA -- 2.7 Conclusions -- References -- Chapter 3: Classification of Encrypted Network Traffic -- 3.1 Introduction -- 3.2 Methods for Encrypted Traffic Classification -- 3.2.1 Port-Based Approach -- 3.2.2 Deep Packet Inspection -- 3.2.3 Time-Based Features -- 3.2.4 Single and Multiple Flow-Based Approaches -- 3.3 Traffic Preprocessing -- 3.4 Encrypted Application Traffic Classification -- 3.5 Conclusion -- References -- Chapter 4: Detection of Anomalous Encrypted Traffic -- 4.1 Introduction -- 4.2 Detecting Attacks Against Encrypted Protocols -- 4.3 Tracing Back Attackers Against Encrypted Protocols -- 4.4 Detection and Traceback Schemes -- 4.4.1 Envisioned Attacks -- 4.4.2 Network Topology -- 4.4.3 DTRAB Learning Stage -- 4.4.4 DTRAB Detection Stage -- 4.4.5 DTRAB Alert Stage -- 4.4.6 DTRAB Traceback Phase -- 4.5 Performance Analysis -- 4.5.1 Highly Collaborative Attack Detection -- 4.5.2 Detection Accuracy -- 4.6 Traceback Scheme Performance -- 4.6.1 Tracing Back Multiple Attackers -- 4.6.2 Investigating the Convergence Point Influence -- 4.7 Conclusion -- References.
Chapter 5: Artificial Intelligence-Based Approaches for Anomaly Detection -- 5.1 Introduction -- 5.2 Machine Learning-Based Approaches for Encrypted Traffic Analysis -- 5.2.1 Attribute-Based Analysis -- 5.2.1.1 Packet Size and Inter-Arrival Time (IAT) -- 5.2.1.2 Burst Size-Surge Duration -- 5.3 Deep Learning-Based Approaches for Encrypted Traffic Analysis -- 5.3.1 Data Preprocessing -- 5.3.2 Traffic Attributes -- 5.3.3 Models -- 5.3.3.1 MLP -- 5.3.3.2 CNN -- 5.3.3.3 SAE -- 5.3.3.4 VAE -- 5.3.3.5 Denoising Auto Encoder (DAE) -- 5.3.3.6 GAN -- 5.4 Proposed Model for Darknet Traffic Classification -- 5.5 Proposed XAI Model -- 5.5.1 Background -- 5.5.2 Methodology -- 5.5.3 Control Case Model Building -- 5.5.4 Light Gradient Boosting -- 5.6 Discussion -- 5.7 Conclusion -- References. |
Record Nr. | UNINA-9910878057803321 |
Cherukuri Aswani Kumar | ||
Cham : , : Springer International Publishing AG, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Process-Aware Systems : Second International Workshop, PAS 2015, Hangzhou, China, October 30, 2015. Revised Selected Papers / / edited by Jian Cao, Xiao Liu, Kaijun Ren |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XII, 129 p. 61 illus.) |
Disciplina | 658.53 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Application software
Computer simulation Data mining Information Systems Applications (incl. Internet) Simulation and Modeling Data Mining and Knowledge Discovery |
ISBN | 981-10-1019-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Process modeling and comparison -- Process data analysis -- Cloud workflow applications. |
Record Nr. | UNINA-9910254993403321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Process-Aware Systems : First International Workshop, PAS 2014, Shanghai, China, October 17, 2014. Proceedings / / edited by Jian Cao, Lijie Wen, Xiao Liu |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 109 p. 40 illus.) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Application software
Information technology Business—Data processing Information storage and retrieval Software engineering Information Systems Applications (incl. Internet) IT in Business Information Storage and Retrieval Software Engineering |
ISBN | 3-662-46170-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Process modeling and comparison -- Workflow scheduling and resource allocation -- Scientific workflow verification -- Workflow applications. |
Record Nr. | UNINA-9910299254403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Service-Oriented Computing – ICSOC 2018 Workshops [[electronic resource] ] : ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12–15, 2018, Revised Selected Papers / / edited by Xiao Liu, Michael Mrissa, Liang Zhang, Djamal Benslimane, Aditya Ghose, Zhongjie Wang, Antonio Bucchiarone, Wei Zhang, Ying Zou, Qi Yu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 492 p. 221 illus., 126 illus. in color.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Application software
Computer organization Software engineering Computer security Artificial intelligence Information Systems Applications (incl. Internet) Computer Systems Organization and Communication Networks Software Engineering Systems and Data Security Artificial Intelligence |
ISBN | 3-030-17642-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | DDBS: Data-Driven Business Services -- NLS4IoT: Networked Learning Systems for Secured IoT Services and Its Applications -- CIoTS: Context-Aware and IoT Services -- ASOCA: Adaptive Service-Oriented and Cloud Applications and ISyCC: IoT Systems for Context-aware Computing -- ADMS: AI and Data Mining for Services. |
Record Nr. | UNISA-996466277803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Service-Oriented Computing – ICSOC 2018 Workshops : ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12–15, 2018, Revised Selected Papers / / edited by Xiao Liu, Michael Mrissa, Liang Zhang, Djamal Benslimane, Aditya Ghose, Zhongjie Wang, Antonio Bucchiarone, Wei Zhang, Ying Zou, Qi Yu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 492 p. 221 illus., 126 illus. in color.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Application software
Computer engineering Computer networks Software engineering Data protection Artificial intelligence Computer and Information Systems Applications Computer Engineering and Networks Software Engineering Data and Information Security Artificial Intelligence |
ISBN | 3-030-17642-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | DDBS: Data-Driven Business Services -- NLS4IoT: Networked Learning Systems for Secured IoT Services and Its Applications -- CIoTS: Context-Aware and IoT Services -- ASOCA: Adaptive Service-Oriented and Cloud Applications and ISyCC: IoT Systems for Context-aware Computing -- ADMS: AI and Data Mining for Services. |
Record Nr. | UNINA-9910337860003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|