top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The Ecosystem of e-Business: Technologies, Stakeholders, and Connections : 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers / / edited by Jennifer J. Xu, Bin Zhu, Xiao Liu, Michael J. Shaw, Han Zhang, Ming Fan
The Ecosystem of e-Business: Technologies, Stakeholders, and Connections : 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers / / edited by Jennifer J. Xu, Bin Zhu, Xiao Liu, Michael J. Shaw, Han Zhang, Ming Fan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 199 p. 29 illus., 19 illus. in color.)
Disciplina 658.8720285
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic commerce
Information technology - Management
Application software
Data protection - Law and legislation
Machine learning
e-Commerce and e-Business
E-Business
Computer Application in Administrative Data Processing
Computer and Information Systems Applications
Privacy
Machine Learning
ISBN 3-030-22784-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Social, Policy, and Privacy Issues -- Impact of Social Media on Real Estate Sales -- An Ecological Business Model for Intelligent Operation and Maintenance of Urban Infrastructure -- Data-Driven Business Models and Professional Services Firms: A Strategic Framework and Transitionary Pathways -- Impacts of Information Provision and Visualization on Collaborative Decision Making -- Why Monetary Gift Giving? The Role of Immediacy and Social Interactivity -- Revealing the Black Box of Privacy Concern: Understanding How Self-disclosure Affects Privacy Concern in the Context of On-demand Services through Two Competing Models -- e-Market -- Competitive Analysis of “Buy Online and Pick Up in Store” Channel -- An Empirical Analysis of Brand Effects on Online Consumer Repurchase Behavior after Unsatisfied Experience -- How to Sell Your House for More -- How Do Novice Consumers Learn from Online Expert Reviews -- FinTech -- An Empirical Investigation of Equity-based crowdfunding Campaigns in the United States -- How Content Features of Charity Crowdfunding Projects Attract Potential Donors? Empirical Study of the Role of Project Images and Texts -- Do Achievement Goals and Work Nature Affect Contributor Performance in Gamified Crowdsourcing? An Exploratory Study in an Academic Setting -- Is a Blockchain-based Game a Game for Fun or a Tool for Speculation? An Empirical Analysis of Player Behavior in Crypokitties -- Artificial Intelligence -- You Are Not You When You Are Hungry: Machine Learning Investigation of Impact of Ratings on Ratee Decision Making -- Ensemble Classification Method for Imbalanced Data Using Deep Learning -- Color Trend Forecasting with Emojis -- Artificial Intelligence (AI) and Cognitive Apportionment for Service Flexibility -- How Long Will Your Videos Remain Popular? Empirical Study of the Impact of Video Features on YouTube Trending Using Deep Learning Methodologies.
Record Nr. UNINA-9910337561703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Encrypted Network Traffic Analysis
Encrypted Network Traffic Analysis
Autore Cherukuri Aswani Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (108 pages)
Altri autori (Persone) IkramSumaiya Thaseen
LiGang
LiuXiao
Collana SpringerBriefs in Computer Science Series
ISBN 3-031-62909-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Acknowledgements -- Contents -- Chapter 1: Introduction -- 1.1 Security in TCP/IP -- 1.2 Security at the Network Layer -- 1.3 Security at Transport Layer -- 1.4 Security at Application Layer -- 1.5 Security Implementations in Other TCP/IP Networks -- 1.6 Network Traffic Analysis -- 1.7 Challenges Involved in Network Traffic Analysis -- 1.8 Conclusions -- References -- Chapter 2: Encrypted Network Traffic Analysis -- 2.1 Introduction -- 2.2 ENTA Methodology -- 2.3 Purpose of the Analysis -- 2.4 Collection of Traffic Data and Preprocessing -- 2.5 Feature Selection and Extraction -- 2.5.1 Packet-Based Features -- 2.5.1.1 Flow-Based Features -- 2.5.2 Session-Based Features -- 2.5.3 Host-Based Features -- 2.6 Techniques for ENTA -- 2.7 Conclusions -- References -- Chapter 3: Classification of Encrypted Network Traffic -- 3.1 Introduction -- 3.2 Methods for Encrypted Traffic Classification -- 3.2.1 Port-Based Approach -- 3.2.2 Deep Packet Inspection -- 3.2.3 Time-Based Features -- 3.2.4 Single and Multiple Flow-Based Approaches -- 3.3 Traffic Preprocessing -- 3.4 Encrypted Application Traffic Classification -- 3.5 Conclusion -- References -- Chapter 4: Detection of Anomalous Encrypted Traffic -- 4.1 Introduction -- 4.2 Detecting Attacks Against Encrypted Protocols -- 4.3 Tracing Back Attackers Against Encrypted Protocols -- 4.4 Detection and Traceback Schemes -- 4.4.1 Envisioned Attacks -- 4.4.2 Network Topology -- 4.4.3 DTRAB Learning Stage -- 4.4.4 DTRAB Detection Stage -- 4.4.5 DTRAB Alert Stage -- 4.4.6 DTRAB Traceback Phase -- 4.5 Performance Analysis -- 4.5.1 Highly Collaborative Attack Detection -- 4.5.2 Detection Accuracy -- 4.6 Traceback Scheme Performance -- 4.6.1 Tracing Back Multiple Attackers -- 4.6.2 Investigating the Convergence Point Influence -- 4.7 Conclusion -- References.
Chapter 5: Artificial Intelligence-Based Approaches for Anomaly Detection -- 5.1 Introduction -- 5.2 Machine Learning-Based Approaches for Encrypted Traffic Analysis -- 5.2.1 Attribute-Based Analysis -- 5.2.1.1 Packet Size and Inter-Arrival Time (IAT) -- 5.2.1.2 Burst Size-Surge Duration -- 5.3 Deep Learning-Based Approaches for Encrypted Traffic Analysis -- 5.3.1 Data Preprocessing -- 5.3.2 Traffic Attributes -- 5.3.3 Models -- 5.3.3.1 MLP -- 5.3.3.2 CNN -- 5.3.3.3 SAE -- 5.3.3.4 VAE -- 5.3.3.5 Denoising Auto Encoder (DAE) -- 5.3.3.6 GAN -- 5.4 Proposed Model for Darknet Traffic Classification -- 5.5 Proposed XAI Model -- 5.5.1 Background -- 5.5.2 Methodology -- 5.5.3 Control Case Model Building -- 5.5.4 Light Gradient Boosting -- 5.6 Discussion -- 5.7 Conclusion -- References.
Record Nr. UNINA-9910878057803321
Cherukuri Aswani Kumar  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Process-Aware Systems : Second International Workshop, PAS 2015, Hangzhou, China, October 30, 2015. Revised Selected Papers / / edited by Jian Cao, Xiao Liu, Kaijun Ren
Process-Aware Systems : Second International Workshop, PAS 2015, Hangzhou, China, October 30, 2015. Revised Selected Papers / / edited by Jian Cao, Xiao Liu, Kaijun Ren
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 129 p. 61 illus.)
Disciplina 658.53
Collana Communications in Computer and Information Science
Soggetto topico Application software
Computer simulation
Data mining
Information Systems Applications (incl. Internet)
Simulation and Modeling
Data Mining and Knowledge Discovery
ISBN 981-10-1019-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Process modeling and comparison -- Process data analysis -- Cloud workflow applications.
Record Nr. UNINA-9910254993403321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Process-Aware Systems : First International Workshop, PAS 2014, Shanghai, China, October 17, 2014. Proceedings / / edited by Jian Cao, Lijie Wen, Xiao Liu
Process-Aware Systems : First International Workshop, PAS 2014, Shanghai, China, October 17, 2014. Proceedings / / edited by Jian Cao, Lijie Wen, Xiao Liu
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 109 p. 40 illus.)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Application software
Information technology
Business—Data processing
Information storage and retrieval
Software engineering
Information Systems Applications (incl. Internet)
IT in Business
Information Storage and Retrieval
Software Engineering
ISBN 3-662-46170-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Process modeling and comparison -- Workflow scheduling and resource allocation -- Scientific workflow verification -- Workflow applications.
Record Nr. UNINA-9910299254403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Service-Oriented Computing – ICSOC 2018 Workshops [[electronic resource] ] : ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12–15, 2018, Revised Selected Papers / / edited by Xiao Liu, Michael Mrissa, Liang Zhang, Djamal Benslimane, Aditya Ghose, Zhongjie Wang, Antonio Bucchiarone, Wei Zhang, Ying Zou, Qi Yu
Service-Oriented Computing – ICSOC 2018 Workshops [[electronic resource] ] : ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12–15, 2018, Revised Selected Papers / / edited by Xiao Liu, Michael Mrissa, Liang Zhang, Djamal Benslimane, Aditya Ghose, Zhongjie Wang, Antonio Bucchiarone, Wei Zhang, Ying Zou, Qi Yu
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 492 p. 221 illus., 126 illus. in color.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Application software
Computer organization
Software engineering
Computer security
Artificial intelligence
Information Systems Applications (incl. Internet)
Computer Systems Organization and Communication Networks
Software Engineering
Systems and Data Security
Artificial Intelligence
ISBN 3-030-17642-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto DDBS: Data-Driven Business Services -- NLS4IoT: Networked Learning Systems for Secured IoT Services and Its Applications -- CIoTS: Context-Aware and IoT Services -- ASOCA: Adaptive Service-Oriented and Cloud Applications and ISyCC: IoT Systems for Context-aware Computing -- ADMS: AI and Data Mining for Services.
Record Nr. UNISA-996466277803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Service-Oriented Computing – ICSOC 2018 Workshops : ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12–15, 2018, Revised Selected Papers / / edited by Xiao Liu, Michael Mrissa, Liang Zhang, Djamal Benslimane, Aditya Ghose, Zhongjie Wang, Antonio Bucchiarone, Wei Zhang, Ying Zou, Qi Yu
Service-Oriented Computing – ICSOC 2018 Workshops : ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12–15, 2018, Revised Selected Papers / / edited by Xiao Liu, Michael Mrissa, Liang Zhang, Djamal Benslimane, Aditya Ghose, Zhongjie Wang, Antonio Bucchiarone, Wei Zhang, Ying Zou, Qi Yu
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 492 p. 221 illus., 126 illus. in color.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Application software
Computer engineering
Computer networks
Software engineering
Data protection
Artificial intelligence
Computer and Information Systems Applications
Computer Engineering and Networks
Software Engineering
Data and Information Security
Artificial Intelligence
ISBN 3-030-17642-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto DDBS: Data-Driven Business Services -- NLS4IoT: Networked Learning Systems for Secured IoT Services and Its Applications -- CIoTS: Context-Aware and IoT Services -- ASOCA: Adaptive Service-Oriented and Cloud Applications and ISyCC: IoT Systems for Context-aware Computing -- ADMS: AI and Data Mining for Services.
Record Nr. UNINA-9910337860003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui