Big Data - BigData 2020 : 9th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Surya Nepal [and five others] |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIV, 254 p. 130 illus., 91 illus. in color.) |
Disciplina | 005.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Society & social sciences
Big data Educational equipment & technology, computer-aided learning (CAL) |
ISBN | 3-030-59612-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research Track -- Entropy-based Approach to Efficient Cleaning of Big Data in Hierarchical Databases -- A Performance Prediction Model for Spark Applications -- Predicting the DJIA with news headlines and historic data using hybrid genetic algorithm/support vector regression and BERT -- Big Data Applications on Large-Scale Infrastructures -- Fake News Classification of Social Media through Sentiment Analysis -- Scalable reference genome assembly from compressed pan-genome index with Spark -- A Web Application for Feral Cat Recognition through Deep Learning -- MCF:Towards Window-based Multiple Cuckoo Filters in Stream Computing -- A Data-Driven Method for Dynamic OD Passenger Flow Matrix Estimation in Urban Metro Systems -- Ensemble learning for heterogeneous missing data imputation -- Validating Goal-Oriented Hypotheses of Business Problems Using Machine Learning: An Exploratory Study of Customer Churn -- The collaborative influence of multiple interactions on successive POI recommendation -- Application Track -- Chemical XAI to Discover Probable Compounds' Spaces based on Mixture of Multiple Mutated Exemplars and Bioassay Existence Ratio -- Clinical Trials Data Management in the Big Data Era -- Cross-Cancer Genome Analysis on Cancer Classification Using Both Unsupervised and Supervised Approaches -- Heavy Vehicle Classification through Deep Learning -- Short Paper Track -- Spatial Association Pattern Mining using In-Memory Computational Framework -- Dissecting Biological Functions for BRCA Genes and their Targeting MicroRNAs within Eight Clusters. |
Record Nr. | UNINA-9910427715303321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data - BigData 2020 : 9th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Surya Nepal [and five others] |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIV, 254 p. 130 illus., 91 illus. in color.) |
Disciplina | 005.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Society & social sciences
Big data Educational equipment & technology, computer-aided learning (CAL) |
ISBN | 3-030-59612-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research Track -- Entropy-based Approach to Efficient Cleaning of Big Data in Hierarchical Databases -- A Performance Prediction Model for Spark Applications -- Predicting the DJIA with news headlines and historic data using hybrid genetic algorithm/support vector regression and BERT -- Big Data Applications on Large-Scale Infrastructures -- Fake News Classification of Social Media through Sentiment Analysis -- Scalable reference genome assembly from compressed pan-genome index with Spark -- A Web Application for Feral Cat Recognition through Deep Learning -- MCF:Towards Window-based Multiple Cuckoo Filters in Stream Computing -- A Data-Driven Method for Dynamic OD Passenger Flow Matrix Estimation in Urban Metro Systems -- Ensemble learning for heterogeneous missing data imputation -- Validating Goal-Oriented Hypotheses of Business Problems Using Machine Learning: An Exploratory Study of Customer Churn -- The collaborative influence of multiple interactions on successive POI recommendation -- Application Track -- Chemical XAI to Discover Probable Compounds' Spaces based on Mixture of Multiple Mutated Exemplars and Bioassay Existence Ratio -- Clinical Trials Data Management in the Big Data Era -- Cross-Cancer Genome Analysis on Cancer Classification Using Both Unsupervised and Supervised Approaches -- Heavy Vehicle Classification through Deep Learning -- Short Paper Track -- Spatial Association Pattern Mining using In-Memory Computational Framework -- Dissecting Biological Functions for BRCA Genes and their Targeting MicroRNAs within Eight Clusters. |
Record Nr. | UNISA-996418282003316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Blockchain – ICBC 2019 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 221 p. 84 illus., 66 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Computers Information storage and retrieval Artificial intelligence Coding theory Information theory Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Information Storage and Retrieval Artificial Intelligence Coding and Information Theory |
ISBN | 3-030-23404-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain: an empirical investigation of its scope for improvement -- Establishing Standards for Consensus on Blockchains -- An Experimental Evaluation of BFT Protocols for Blockchains -- Layered Consensus Mechanism in Consortium Blockchain for Enterprise Services -- Digital-Physical Parity for Food Fraud Detection -- Blockchain Interoperable Digital Objects -- Patient Privacy and Ownership of Electronic Health Records on a Blockchain -- Blockchain Federation for Complex Distributed Applications -- Enriching Smart Contracts with Temporal Aspects -- CloudAgora: Democratizing the Cloud -- Dual Token Blockchain Economy Framework, The Garment Use case -- Performance Benchmarking and Optimization for Blockchain: A Survey -- Developing a Vehicle Networking Platform based on Blockchain Technology -- Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone -- Performance Evaluation of Hyperledger Fabric with Malicious Behavior. . |
Record Nr. | UNISA-996466322303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Blockchain – ICBC 2019 : Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 221 p. 84 illus., 66 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer organization Computers Information storage and retrieval Artificial intelligence Coding theory Information theory Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Information Storage and Retrieval Artificial Intelligence Coding and Information Theory |
ISBN | 3-030-23404-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain: an empirical investigation of its scope for improvement -- Establishing Standards for Consensus on Blockchains -- An Experimental Evaluation of BFT Protocols for Blockchains -- Layered Consensus Mechanism in Consortium Blockchain for Enterprise Services -- Digital-Physical Parity for Food Fraud Detection -- Blockchain Interoperable Digital Objects -- Patient Privacy and Ownership of Electronic Health Records on a Blockchain -- Blockchain Federation for Complex Distributed Applications -- Enriching Smart Contracts with Temporal Aspects -- CloudAgora: Democratizing the Cloud -- Dual Token Blockchain Economy Framework, The Garment Use case -- Performance Benchmarking and Optimization for Blockchain: A Survey -- Developing a Vehicle Networking Platform based on Blockchain Technology -- Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone -- Performance Evaluation of Hyperledger Fabric with Malicious Behavior. . |
Record Nr. | UNINA-9910337836603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (297 pages) |
Disciplina | 016.391 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-031-23690-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Abstracts of Keynote Addresses -- The Rise of Cyber Physical Security -- Research and Engineering Challenges of Blockchain and Web3 -- Security and Privacy in Federated Learning -- Web3 and the Interoperability of Asset Networks -- Abstracts of Invited Addresses -- Securing Cyber-Physical and IoT Systems in Smart Living Environments -- Advanced Persistent Threats: A Study in Indian Context -- Technology Transfer from Security Research Projects: A Personal Perspective -- Contents -- Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection -- 1 Introduction -- 2 Problem Description -- 3 Approach and Architecture -- 3.1 Tagged Provenance Graphs -- 3.2 Identifying Similar Nodes -- 3.3 Edge Label Similarity -- 3.4 Graph Similarity Detection -- 4 Evaluation -- 4.1 Ostinato Efficacy -- 4.2 Node Similarity Accuracy -- 4.3 Run-Time Performance -- 4.4 Threat Alert Fatigue Mitigation -- 4.5 Comparison with Other Tools -- 5 Related Work -- 6 Conclusion -- References -- DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure -- 1 Introduction -- 2 Related Work -- 3 DKS-PKI Architecture -- 3.1 Overview -- 3.2 Node Operations -- 3.3 Authoritative Signing Keys (ASKs) -- 3.4 Certificate Registration/Issuance and Storage -- 3.5 Certificate Distribution -- 3.6 Certificate Revocation -- 3.7 Stored-Data Validation -- 4 Evaluation -- 4.1 Security Analysis -- 4.2 Implementation -- 4.3 Experimental Environment -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage -- 1 Introduction -- 2 Background and Related Work -- 2.1 Linkage with Bloom Filters -- 2.2 Hardening Bloom Filters -- 2.3 Privacy Measures -- 3 Generating-Sets and Amplification -- 3.1 Generating-Set Amplification Factor.
3.2 Amplification Factor in Deterministic Methods -- 3.3 Amplification Factor in Probabilistic Methods -- 4 Parameter Selection in Probabilistic Methods -- 5 Empirical Evaluation -- 5.1 Setup -- 5.2 Bit Frequency Measures -- 5.3 Generating-Set Amplification Factor -- 5.4 Linkage Quality -- 5.5 Discussion -- 6 Conclusion and Future Work -- References -- .26em plus .1em minus .1emSHIELD: A Multimodal Deep Learning Framework for Android Malware Detection -- 1 Introduction -- 2 Related Work -- 2.1 Static Analysis Based Android Malware Detection Techniques -- 2.2 Dynamic Analysis Based Android Malware Detection Techniques -- 2.3 Hybrid Analysis Based Android Malware Detection Techniques -- 3 SHIELD: The Proposed Framework -- 3.1 Feature Extraction -- 3.2 Markov Image Generation -- 3.3 Network Construction -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Evaluation Environment -- 4.3 Performance Analysis Based Markov Images Separately -- 4.4 Performance Analysis Based on Multimodal Latent Features -- 4.5 Unknown Malware Family Detection -- 4.6 Backdoor Analysis -- 4.7 Comparison with State-of-the-Art Work -- 5 Conclusion and Future Work -- References -- Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes -- 1 Introduction -- 2 Related Work -- 3 Need for a Unified Model -- 4 Preliminaries -- 4.1 Readers-Writers Flow Model -- 5 Samyukta: A Unified Access Control Model -- 5.1 Formal Specification -- 5.2 Request Flow in Samyukta -- 5.3 Authorization Procedure -- 6 Effectiveness of Samyukta -- 6.1 Merits of Samyukta -- 7 Experimental Analysis -- 8 Conclusions -- References -- Efficient and Effective Static Android Malware Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Set -- 3.3 Machine Learning Classifier -- 3.4 Evaluation. 4 Comparison with Existing Approaches -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Attacks on ML Systems: From Security Analysis to Attack Mitigation -- 1 Introduction -- 2 ML Systems and Attacks -- 2.1 ML Systems Have Three Main Perspectives -- 2.2 Adversarial Attacks -- 3 Security Analysis Requirements of ML Systems -- 3.1 ML System Security Analysis Requirements -- 3.2 Limitations of Prior Work on ML Security Analysis -- 4 Proposed Approach -- 4.1 The AI Security Causality Graph -- 4.2 The ML System Dependency Graph -- 4.3 Using the ML-SSA Approach to Analyze the Word Translation Attacks -- 5 AI Security Analysis and Attack Mitigation -- 5.1 Using the Example Word-to-Word Translation ML System to Illustrate Relevant Mitigation Strategies -- 6 Conclusion and Future Directions -- References -- MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Federated Learning -- 2.2 Shapley Value -- 2.3 Inference Attacks -- 3 Threat Model -- 4 MILSA: The Proposed Attack -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 The Proposed Defense -- 7 Conclusion -- References -- IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics -- 1 Introduction -- 2 Related Works -- 3 IoTInDet Methodology -- 3.1 Class Scatter Ratio Based Feature Selection -- 3.2 Hellinger Distance Chart Generation -- 3.3 IoT Normal Traffic Description -- 3.4 IoT Traffic Intrusion Detection -- 4 Experimental Results -- 5 Conclusion -- References -- Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD) -- 1 Introduction -- 2 Related Work -- 3 Cloud-Based DDoS Attacks -- 4 Out-Cloud Attack Cases in Cloud -- 4.1 An Attacker in the Cloud -- 4.2 A Reflector Server in the Cloud. 5 Out-Cloud Attack Detection (OCAD) -- 5.1 Traffic Directions -- 5.2 Virtual Interfaces vs Real Interfaces -- 5.3 Case 1: An Attacker in the Cloud -- 5.4 Case 2: A Reflector Server in the Cloud -- 5.5 OCAD Modules -- 6 Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Amplification Attack -- 6.3 Reflection Attack -- 6.4 Experimental Results -- 7 Discussion -- 8 Conclusions -- References -- Mining Attribute-Based Access Control Policies -- 1 Introduction -- 2 Overview of ABAC -- 3 Related Work -- 4 ABAC Policy Extraction -- 4.1 Policy Mining -- 4.2 Policy Extraction Using Machine Learning -- 5 Experimental Evaluation -- 5.1 Performance of Policy Mining Approach -- 5.2 Performance of ABAC Policies with Constraints -- 5.3 Performance of Policy Extraction Using Machine Learning -- 6 Conclusion -- References -- Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling -- 1 Introduction -- 2 Background -- 2.1 A Brief Introduction to IFC -- 2.2 Dynamic Labelling (DL) Algorithm ch12secrypt18,ch12ghosal2018compile -- 2.3 Readers-Writers Flow Model (RWFM) ch12kumar2017complete -- 3 Security Challenges and Our Approach -- 3.1 Flow Sensitivity -- 3.2 Termination Sensitivity -- 3.3 Eval Statement -- 3.4 Declassification -- 4 Solution for Preventing Privacy-Violating Flows -- 5 Related Work -- 6 Conclusions and Future Work -- References -- On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Demand Manipulation Attacks -- 2.2 Anomaly Detection Mechanism -- 2.3 Related Work -- 3 Methodology -- 3.1 Power Consumption Data -- 3.2 Model Training -- 3.3 Anomaly Score -- 3.4 Thresholding Mechanism -- 3.5 Attack Profiles -- 4 Threshold Selection -- 4.1 The Threshold Dilemma -- 5 Model Tolerance and Impact -- 6 Conclusion and Future Work. References -- WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Saturation Attack Detection -- 3.2 Attack Mitigation -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Implementation and Evaluation -- 4.1 System Setup -- 4.2 Evaluation -- 4.3 Measurement Study -- 4.4 Comparison with Existing Tools -- 5 Conclusion -- References -- WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection -- 1 Introduction -- 2 Impact Study -- 3 Detecting Attacks -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910634049003321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (297 pages) |
Disciplina | 016.391 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-031-23690-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Abstracts of Keynote Addresses -- The Rise of Cyber Physical Security -- Research and Engineering Challenges of Blockchain and Web3 -- Security and Privacy in Federated Learning -- Web3 and the Interoperability of Asset Networks -- Abstracts of Invited Addresses -- Securing Cyber-Physical and IoT Systems in Smart Living Environments -- Advanced Persistent Threats: A Study in Indian Context -- Technology Transfer from Security Research Projects: A Personal Perspective -- Contents -- Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection -- 1 Introduction -- 2 Problem Description -- 3 Approach and Architecture -- 3.1 Tagged Provenance Graphs -- 3.2 Identifying Similar Nodes -- 3.3 Edge Label Similarity -- 3.4 Graph Similarity Detection -- 4 Evaluation -- 4.1 Ostinato Efficacy -- 4.2 Node Similarity Accuracy -- 4.3 Run-Time Performance -- 4.4 Threat Alert Fatigue Mitigation -- 4.5 Comparison with Other Tools -- 5 Related Work -- 6 Conclusion -- References -- DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure -- 1 Introduction -- 2 Related Work -- 3 DKS-PKI Architecture -- 3.1 Overview -- 3.2 Node Operations -- 3.3 Authoritative Signing Keys (ASKs) -- 3.4 Certificate Registration/Issuance and Storage -- 3.5 Certificate Distribution -- 3.6 Certificate Revocation -- 3.7 Stored-Data Validation -- 4 Evaluation -- 4.1 Security Analysis -- 4.2 Implementation -- 4.3 Experimental Environment -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage -- 1 Introduction -- 2 Background and Related Work -- 2.1 Linkage with Bloom Filters -- 2.2 Hardening Bloom Filters -- 2.3 Privacy Measures -- 3 Generating-Sets and Amplification -- 3.1 Generating-Set Amplification Factor.
3.2 Amplification Factor in Deterministic Methods -- 3.3 Amplification Factor in Probabilistic Methods -- 4 Parameter Selection in Probabilistic Methods -- 5 Empirical Evaluation -- 5.1 Setup -- 5.2 Bit Frequency Measures -- 5.3 Generating-Set Amplification Factor -- 5.4 Linkage Quality -- 5.5 Discussion -- 6 Conclusion and Future Work -- References -- .26em plus .1em minus .1emSHIELD: A Multimodal Deep Learning Framework for Android Malware Detection -- 1 Introduction -- 2 Related Work -- 2.1 Static Analysis Based Android Malware Detection Techniques -- 2.2 Dynamic Analysis Based Android Malware Detection Techniques -- 2.3 Hybrid Analysis Based Android Malware Detection Techniques -- 3 SHIELD: The Proposed Framework -- 3.1 Feature Extraction -- 3.2 Markov Image Generation -- 3.3 Network Construction -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Evaluation Environment -- 4.3 Performance Analysis Based Markov Images Separately -- 4.4 Performance Analysis Based on Multimodal Latent Features -- 4.5 Unknown Malware Family Detection -- 4.6 Backdoor Analysis -- 4.7 Comparison with State-of-the-Art Work -- 5 Conclusion and Future Work -- References -- Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes -- 1 Introduction -- 2 Related Work -- 3 Need for a Unified Model -- 4 Preliminaries -- 4.1 Readers-Writers Flow Model -- 5 Samyukta: A Unified Access Control Model -- 5.1 Formal Specification -- 5.2 Request Flow in Samyukta -- 5.3 Authorization Procedure -- 6 Effectiveness of Samyukta -- 6.1 Merits of Samyukta -- 7 Experimental Analysis -- 8 Conclusions -- References -- Efficient and Effective Static Android Malware Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Set -- 3.3 Machine Learning Classifier -- 3.4 Evaluation. 4 Comparison with Existing Approaches -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Attacks on ML Systems: From Security Analysis to Attack Mitigation -- 1 Introduction -- 2 ML Systems and Attacks -- 2.1 ML Systems Have Three Main Perspectives -- 2.2 Adversarial Attacks -- 3 Security Analysis Requirements of ML Systems -- 3.1 ML System Security Analysis Requirements -- 3.2 Limitations of Prior Work on ML Security Analysis -- 4 Proposed Approach -- 4.1 The AI Security Causality Graph -- 4.2 The ML System Dependency Graph -- 4.3 Using the ML-SSA Approach to Analyze the Word Translation Attacks -- 5 AI Security Analysis and Attack Mitigation -- 5.1 Using the Example Word-to-Word Translation ML System to Illustrate Relevant Mitigation Strategies -- 6 Conclusion and Future Directions -- References -- MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Federated Learning -- 2.2 Shapley Value -- 2.3 Inference Attacks -- 3 Threat Model -- 4 MILSA: The Proposed Attack -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 The Proposed Defense -- 7 Conclusion -- References -- IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics -- 1 Introduction -- 2 Related Works -- 3 IoTInDet Methodology -- 3.1 Class Scatter Ratio Based Feature Selection -- 3.2 Hellinger Distance Chart Generation -- 3.3 IoT Normal Traffic Description -- 3.4 IoT Traffic Intrusion Detection -- 4 Experimental Results -- 5 Conclusion -- References -- Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD) -- 1 Introduction -- 2 Related Work -- 3 Cloud-Based DDoS Attacks -- 4 Out-Cloud Attack Cases in Cloud -- 4.1 An Attacker in the Cloud -- 4.2 A Reflector Server in the Cloud. 5 Out-Cloud Attack Detection (OCAD) -- 5.1 Traffic Directions -- 5.2 Virtual Interfaces vs Real Interfaces -- 5.3 Case 1: An Attacker in the Cloud -- 5.4 Case 2: A Reflector Server in the Cloud -- 5.5 OCAD Modules -- 6 Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Amplification Attack -- 6.3 Reflection Attack -- 6.4 Experimental Results -- 7 Discussion -- 8 Conclusions -- References -- Mining Attribute-Based Access Control Policies -- 1 Introduction -- 2 Overview of ABAC -- 3 Related Work -- 4 ABAC Policy Extraction -- 4.1 Policy Mining -- 4.2 Policy Extraction Using Machine Learning -- 5 Experimental Evaluation -- 5.1 Performance of Policy Mining Approach -- 5.2 Performance of ABAC Policies with Constraints -- 5.3 Performance of Policy Extraction Using Machine Learning -- 6 Conclusion -- References -- Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling -- 1 Introduction -- 2 Background -- 2.1 A Brief Introduction to IFC -- 2.2 Dynamic Labelling (DL) Algorithm ch12secrypt18,ch12ghosal2018compile -- 2.3 Readers-Writers Flow Model (RWFM) ch12kumar2017complete -- 3 Security Challenges and Our Approach -- 3.1 Flow Sensitivity -- 3.2 Termination Sensitivity -- 3.3 Eval Statement -- 3.4 Declassification -- 4 Solution for Preventing Privacy-Violating Flows -- 5 Related Work -- 6 Conclusions and Future Work -- References -- On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Demand Manipulation Attacks -- 2.2 Anomaly Detection Mechanism -- 2.3 Related Work -- 3 Methodology -- 3.1 Power Consumption Data -- 3.2 Model Training -- 3.3 Anomaly Score -- 3.4 Thresholding Mechanism -- 3.5 Attack Profiles -- 4 Threshold Selection -- 4.1 The Threshold Dilemma -- 5 Model Tolerance and Impact -- 6 Conclusion and Future Work. References -- WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Saturation Attack Detection -- 3.2 Attack Mitigation -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Implementation and Evaluation -- 4.1 System Setup -- 4.2 Evaluation -- 4.3 Measurement Study -- 4.4 Comparison with Existing Tools -- 5 Conclusion -- References -- WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection -- 1 Introduction -- 2 Impact Study -- 3 Detecting Attacks -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996503470303316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Service-Oriented Computing--ICSOC 2013 Workshops [[electronic resource] ] : CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers / / edited by Alessio Lomuscio, Surya Nepal, Fabio Patrizi, Boualem Benatallah, Ivona Brandić |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 586 p. 220 illus.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Application software Information technology Business—Data processing Management information systems Computer science Software Engineering Information Systems Applications (incl. Internet) IT in Business Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Computer Science, general |
ISBN | 3-319-06859-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Engineering Service-Oriented Applications WESOA 2013 -- Introduction to the 9th International Workshop on Engineering Service-Oriented Applications (WESOA’13) -- From Process Models to Business Process Architectures: Connecting the Layers -- Goal-Driven Composition of Business Process Models -- Integrating Service Release Management with Service Solution Design -- Practical Compiler-Based User Support during the Development of Business Processes -- Model Checking GSM-Based Multi-Agent Systems -- Towards Modeling and Execution of Collective Adaptive Systems -- A Requirements-Based Model for Effort Estimation in Service-Oriented Systems -- Augmenting Complex Problem Solving with Hybrid Compute Units -- Towards Automating the Detection of Event Sources -- Discovering Pattern-Based Mediator Services from Communication Logs -- Cloud Service Brokerage CSB 2013 -- Cloud Service Brokerage - 2013: Methods and Mechanisms -- A Comparison Framework and Review of Service Brokerage Solutions for Cloud Architectures -- Brokerage for Quality Assurance and Optimisation of Cloud Services: An Analysis of Key Requirements -- Towards Value-Driven Business Modelling Based on Service Brokerage -- Introducing Policy-Driven Governance and Service Level Failure Mitigation in Cloud Service Brokers: Challenges Ahead -- Model-Based Testing in Cloud Brokerage Scenarios -- Value-Added Modelling and Analysis in Service Value Brokerage -- Semantic Web Enabled Software Engineering SWESE 2013 -- Introduction to the Proceedings of the 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE) 2013 -- Management of Variability in Modular Ontology Development -- Towards Automated Service Matchmaking and Planning for Multi-Agent Systems with OWL-S – Approach and Challenges -- Re-engineering the ISO 15926 Data Model: A Multi-level Metamodel Perspective -- Fluent Calculus-Based Semantic Web Service Composition and Verification Using WSSL -- Template-Based Ontology Population for Smart Environments Configuration -- Cloud Computing and Scientific Applications CCSA 2013 -- Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA’13) -- SLA-Aware Load Balancing in a Web-Based Cloud System over OpenStack -- Are Public Clouds Elastic Enough for Scientific Computing? -- A Light-Weight Framework for Bridge-Building from Desktop to Cloud -- Planning and Scheduling Data Processing Workflows in the Cloud with Quality-of-Data Constraints -- Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud -- SciLightning: A Cloud Provenance-Based Event Notification for Parallel Workflows -- Energy Savings on a Cloud-Based Opportunistic Infrastructure -- Pervasive Analytical Service Clouds for the Enterprise and Beyond PACEB 2013 -- Introduction to the Proceedings of the Workshop on Pervasive -- Analytical Service Clouds for the Enterprise and Beyond (PASCEB) 2013 -- Towards a Formal Model for Cloud Computing -- An Optimized Strategy for Data Service Response with Template-Based Caching and Compression -- Model-Driven Event Query Generation for Business Process Monitoring -- Enabling Semantic Complex Event Processing in the Domain of Logistics -- Towards Self-adaptation Planning for Complex Service-Based Systems -- Towards an Integration Platform for Bioinformatics Services -- Requirements to Pervasive System Continuous Deployment -- Towards Structure-Based Quality Awareness in Software Ecosystem Use -- An Adaptive Enterprise Service Bus Infrastructure for Service Based Systems -- Dynamic Adaptation of Business Process Based on Context Changes: A Rule-Oriented Approach -- Flexible Component Migration in an OSGi Based Pervasive Cloud Infrastructure -- Hybrid Emotion Recognition Using Semantic Similarity -- PhD Symposium -- ICSOC PhD Symposium 2013 -- Towards the Automated Synthesis of Data Dependent Service Controllers -- Multi-agent Approach for Managing Workflows in an Inter-Cloud Environment -- An Information-Centric System for Building the Web of Things -- Testing of Distributed Service-Oriented Systems -- Automation of the SLA Life Cycle in Cloud Computing -- Towards a Dynamic Declarative Service Workflow Reference Model -- A Context-Aware Access Control Framework for Software Services -- Description and Composition of Services towards the Web-Telecom Convergence. |
Record Nr. | UNISA-996214045903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Service-Oriented Computing--ICSOC 2013 Workshops : CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers / / edited by Alessio Lomuscio, Surya Nepal, Fabio Patrizi, Boualem Benatallah, Ivona Brandić |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 586 p. 220 illus.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Application software Information technology Business—Data processing Management information systems Computer science Software Engineering Information Systems Applications (incl. Internet) IT in Business Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Computer Science, general |
ISBN | 3-319-06859-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Engineering Service-Oriented Applications WESOA 2013 -- Introduction to the 9th International Workshop on Engineering Service-Oriented Applications (WESOA’13) -- From Process Models to Business Process Architectures: Connecting the Layers -- Goal-Driven Composition of Business Process Models -- Integrating Service Release Management with Service Solution Design -- Practical Compiler-Based User Support during the Development of Business Processes -- Model Checking GSM-Based Multi-Agent Systems -- Towards Modeling and Execution of Collective Adaptive Systems -- A Requirements-Based Model for Effort Estimation in Service-Oriented Systems -- Augmenting Complex Problem Solving with Hybrid Compute Units -- Towards Automating the Detection of Event Sources -- Discovering Pattern-Based Mediator Services from Communication Logs -- Cloud Service Brokerage CSB 2013 -- Cloud Service Brokerage - 2013: Methods and Mechanisms -- A Comparison Framework and Review of Service Brokerage Solutions for Cloud Architectures -- Brokerage for Quality Assurance and Optimisation of Cloud Services: An Analysis of Key Requirements -- Towards Value-Driven Business Modelling Based on Service Brokerage -- Introducing Policy-Driven Governance and Service Level Failure Mitigation in Cloud Service Brokers: Challenges Ahead -- Model-Based Testing in Cloud Brokerage Scenarios -- Value-Added Modelling and Analysis in Service Value Brokerage -- Semantic Web Enabled Software Engineering SWESE 2013 -- Introduction to the Proceedings of the 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE) 2013 -- Management of Variability in Modular Ontology Development -- Towards Automated Service Matchmaking and Planning for Multi-Agent Systems with OWL-S – Approach and Challenges -- Re-engineering the ISO 15926 Data Model: A Multi-level Metamodel Perspective -- Fluent Calculus-Based Semantic Web Service Composition and Verification Using WSSL -- Template-Based Ontology Population for Smart Environments Configuration -- Cloud Computing and Scientific Applications CCSA 2013 -- Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA’13) -- SLA-Aware Load Balancing in a Web-Based Cloud System over OpenStack -- Are Public Clouds Elastic Enough for Scientific Computing? -- A Light-Weight Framework for Bridge-Building from Desktop to Cloud -- Planning and Scheduling Data Processing Workflows in the Cloud with Quality-of-Data Constraints -- Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud -- SciLightning: A Cloud Provenance-Based Event Notification for Parallel Workflows -- Energy Savings on a Cloud-Based Opportunistic Infrastructure -- Pervasive Analytical Service Clouds for the Enterprise and Beyond PACEB 2013 -- Introduction to the Proceedings of the Workshop on Pervasive -- Analytical Service Clouds for the Enterprise and Beyond (PASCEB) 2013 -- Towards a Formal Model for Cloud Computing -- An Optimized Strategy for Data Service Response with Template-Based Caching and Compression -- Model-Driven Event Query Generation for Business Process Monitoring -- Enabling Semantic Complex Event Processing in the Domain of Logistics -- Towards Self-adaptation Planning for Complex Service-Based Systems -- Towards an Integration Platform for Bioinformatics Services -- Requirements to Pervasive System Continuous Deployment -- Towards Structure-Based Quality Awareness in Software Ecosystem Use -- An Adaptive Enterprise Service Bus Infrastructure for Service Based Systems -- Dynamic Adaptation of Business Process Based on Context Changes: A Rule-Oriented Approach -- Flexible Component Migration in an OSGi Based Pervasive Cloud Infrastructure -- Hybrid Emotion Recognition Using Semantic Similarity -- PhD Symposium -- ICSOC PhD Symposium 2013 -- Towards the Automated Synthesis of Data Dependent Service Controllers -- Multi-agent Approach for Managing Workflows in an Inter-Cloud Environment -- An Information-Centric System for Building the Web of Things -- Testing of Distributed Service-Oriented Systems -- Automation of the SLA Life Cycle in Cloud Computing -- Towards a Dynamic Declarative Service Workflow Reference Model -- A Context-Aware Access Control Framework for Software Services -- Description and Composition of Services towards the Web-Telecom Convergence. |
Record Nr. | UNINA-9910483013303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Social Media for Government Services / / edited by Surya Nepal, Cécile Paris, Dimitrios Georgakopoulos |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina | 004 |
Soggetto topico |
Application software
Computer Appl. in Social and Behavioral Sciences |
ISBN | 3-319-27237-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Social Media in Government Services: An Introduction -- Use of Social Media for Internal Communication: A Case Study in a Government Organisation -- Social Media Policy in Turkish Municipalities: Disparity between Awareness and Implementation -- Detecting Bursty Topics of Correlated News and Twitter for Government Services -- Gamification on the Social Web -- A Lexical Resource for Identifying Public Services Names on the Social Web -- Multi-Hazard Detection by Integrating Social Media and Physical Sensors. |
Record Nr. | UNINA-9910299260303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|