Information and Communications Security [[electronic resource] ] : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
| Information and Communications Security [[electronic resource] ] : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XVII, 833 p. 279 illus., 167 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data structures (Computer science)
Data protection Computer communication systems Application software Computers Computers - Law and legislation Software engineering Data Structures and Information Theory Security Computer Communication Networks Information Systems Applications (incl. Internet) Legal Aspects of Computing Software Engineering/Programming and Operating Systems |
| ISBN | 3-030-41579-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Prototype-based malware traffic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulfHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Selcuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order -- Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectoral Boolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Differential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels – Cloud CoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preserving Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters – DL chain: a Covert Channel over Blockchain based on Dynamic Labels. |
| Record Nr. | UNISA-996418208503316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
| Information and Communications Security : 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers / / edited by Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XVII, 833 p. 279 illus., 167 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data structures (Computer science)
Information theory Data protection Computer networks Application software Computers - Law and legislation Information technology - Law and legislation Software engineering Data Structures and Information Theory Data and Information Security Computer Communication Networks Computer and Information Systems Applications Legal Aspects of Computing Software Engineering |
| ISBN | 3-030-41579-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Prototype-based malware trafic classification with novelty detection -- Evading API Call Sequence Based Malware Classifiers -- UBER: Combating Sandbox Evasion via User Behavior Emulators -- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems -- Maged Abdelaty, Roberto Doriguzzi-Corin and Domenico Siracusa Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data -- Cloning Vulnerability Detection in Driver Layer of IoT Devices -- Impact of Multiple Re ections on Secrecy Capacity of Indoor VLC System -- Road Context-aware Intrusion Detection System for Autonomous Cars -- Enterprise Network Security -- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC -- HeteroUI:A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks -- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding -- VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode -- Deep Learning-Based Vulnerable Function Detection: A Benchmark -- Automatic Demirci-Sel cuk Meet-in-the-Middle Attack on SKINNY with Key-bridging -- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacks -- CDAE: Towards Empowering Denoising in Side-Channel Analysis -- Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies -- Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems -- Provably Secure Group Authentication in the Asynchronous Communication Model -- AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities -- A Multi-group Signature Scheme from Lattices -- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption -- Using Equivalent Class to Solve Interval Discrete Logarithm Problem -- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and VectorialBoolean Functions (S-Boxes) -- Accelerating SM2 Digital Signature Algorithm using Modern Processor Features -- Improved Di erential Attacks on GIFT-64 -- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs -- Context-aware IPv6 Address Hopping -- Towards Homograph-confusable Domain Name Detection using Dual-channel CNN -- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels -- CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework -- An Adversarial Attack Based on Multi-Objective Optimization in the Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks -- Capturing the Persistence of Facial Expression Features for Deepfake -- Video Detection -- Differentially Private Frequent Itemset Mining against Incremental Updates -- Privacy-Preservinig Distributed Machine Learning based on Secret Sharing -- Privacy-preserving Decentralised Singular Value Decomposition -- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning -- A Character-Level BiGRU-Attention For Phishing Classification -- Tear O Your Disguise: Phishing Website Detection using Visual and Network Identities -- Steganography and Steganalysis -- Hierarchical Repesentation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals -- Convolutional Neural Network based Side-Channel Attacks with Customized Filters -- DLchain: a Covert Channel over Blockchain based on Dynamic Labels. |
| Record Nr. | UNINA-9910380748503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Network and System Security [[electronic resource] ] : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
| Network and System Security [[electronic resource] ] : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XII, 492 p. 167 illus., 117 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computers Law and legislation Computer organization Application software Software engineering Artificial intelligence Systems and Data Security Legal Aspects of Computing Computer Systems Organization and Communication Networks Information Systems Applications (incl. Internet) Software Engineering Artificial Intelligence |
| ISBN | 3-030-02744-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. |
| Record Nr. | UNISA-996466321903316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak
| Network and System Security : 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings / / edited by Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XII, 492 p. 167 illus., 117 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computers Law and legislation Computer organization Application software Software engineering Artificial intelligence Systems and Data Security Legal Aspects of Computing Computer Systems Organization and Communication Networks Information Systems Applications (incl. Internet) Software Engineering Artificial Intelligence |
| ISBN |
9783030027445
3030027449 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics -- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems -- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi -- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks -- User Relationship Classication of Facebook Messenger Mobile Data using WEKA -- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain -- Real-time IoT Device Activity Detection in Edge Networks -- Analysis on the Block Reward of Fork After Withholding -- DBAF: Dynamic Binary Analysis Framework and Its Applications -- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control -- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing -- Analyzing the Communication Security between Smartphones and IoT based on CORAS -- An efficient privacy preserving batch authentication scheme with deterable function for VANETs -- Using Software Visualization for Supporting the Teaching of Map Reduce -- Walking on the Cloud: Gait Recognition, a Wearable Solution -- Anonymous Attribute-Based Conditional Proxy Re-Encryption -- Burn After Reading: Expunging Execution Footprints of Android Apps -- Comprehensive Analysis of the Permissions used in Android -- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity -- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search -- An OpenvSwitch Extension for SDN Traceback -- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks -- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption -- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs -- Creating and Managing Realism in the Next-Generation Cyber Range -- Deep Android Malware Detection with Adaptive Classifier Selection -- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge -- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices -- Understanding the Behaviors of BGP-based DDoS Protection Services -- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture -- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke -- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices -- Android Malware Detection Methods Based on the Combination of Clustering and Classification -- Secure Semantic Search based on Two-level Index over Encrypted Cloud -- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. |
| Record Nr. | UNINA-9910349386303321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
| Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou |
| Pubbl/distr/stampa | Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] |
| Descrizione fisica | 1 online resource (334 pages) : illustrations |
| Disciplina | 005.4/46 |
| Collana | CRC Series in Security, Privacy and Trust |
| Soggetto topico |
Mobile communication systems - Security measures
Smartphones - Security measures |
| ISBN |
1-315-36964-8
1-4987-3592-4 1-315-35263-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Section I. Authentication techniques for mobile devices -- Section II. Mobile device privacy -- Section III. Mobile operating system vulnerabilities -- Section IV. Malware classification and detection -- Section V. Mobile network security. |
| Record Nr. | UNINA-9910153184703321 |
| Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Privacy in Communication Networks : 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I / / edited by Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Au
| Security and Privacy in Communication Networks : 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I / / edited by Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Au |
| Autore | Duan Haixin |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (543 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
DebbabiMourad
de Carné de CarnavaletXavier LuoXiapu DuXiaojiang AuMan-Ho |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks - Security measures
Data protection Cryptography Data encryption (Computer science) Application software Mobile and Network Security Data and Information Security Cryptology Security Services Computer and Information Systems Applications |
| ISBN | 3-031-64948-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | AI for Security -- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS -- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification -- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph -- DNN Architecture Attacks via Network and Power Side Channels -- Invisibility Spell Adversarial Patch Attack Against Object Detectors -- Meta Perturbation Generation Network for Text based CAPTCHA -- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks -- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval -- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas -- Authentication -- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density -- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home -- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller -- Blockchain and Distributed System Security -- Byzantine Protocols with Asymptotically Optimal Communication Complexity -- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving -- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography -- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption -- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS -- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage -- Efficient Zero Knowledge for Regular Language -- Enabling Fast Settlement in Atomic Cross-Chain Swaps -- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference -- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching -- Data Security -- An Authentication Algorithm for Sets of Spatial Data Objects -- An Efficient Private Information Retrieval Protocol Based on TFHE -- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries -- Password Cracking by Exploiting User Group Information. |
| Record Nr. | UNINA-9910983327203321 |
Duan Haixin
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||