top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Big Data - BigData 2020 : 9th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Surya Nepal [and five others]
Big Data - BigData 2020 : 9th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Surya Nepal [and five others]
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIV, 254 p. 130 illus., 91 illus. in color.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Society & social sciences
Big data
Educational equipment & technology, computer-aided learning (CAL)
ISBN 3-030-59612-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Research Track -- Entropy-based Approach to Efficient Cleaning of Big Data in Hierarchical Databases -- A Performance Prediction Model for Spark Applications -- Predicting the DJIA with news headlines and historic data using hybrid genetic algorithm/support vector regression and BERT -- Big Data Applications on Large-Scale Infrastructures -- Fake News Classification of Social Media through Sentiment Analysis -- Scalable reference genome assembly from compressed pan-genome index with Spark -- A Web Application for Feral Cat Recognition through Deep Learning -- MCF:Towards Window-based Multiple Cuckoo Filters in Stream Computing -- A Data-Driven Method for Dynamic OD Passenger Flow Matrix Estimation in Urban Metro Systems -- Ensemble learning for heterogeneous missing data imputation -- Validating Goal-Oriented Hypotheses of Business Problems Using Machine Learning: An Exploratory Study of Customer Churn -- The collaborative influence of multiple interactions on successive POI recommendation -- Application Track -- Chemical XAI to Discover Probable Compounds' Spaces based on Mixture of Multiple Mutated Exemplars and Bioassay Existence Ratio -- Clinical Trials Data Management in the Big Data Era -- Cross-Cancer Genome Analysis on Cancer Classification Using Both Unsupervised and Supervised Approaches -- Heavy Vehicle Classification through Deep Learning -- Short Paper Track -- Spatial Association Pattern Mining using In-Memory Computational Framework -- Dissecting Biological Functions for BRCA Genes and their Targeting MicroRNAs within Eight Clusters.
Record Nr. UNINA-9910427715303321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data - BigData 2020 : 9th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Surya Nepal [and five others]
Big Data - BigData 2020 : 9th International Conference, held as part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, proceedings / / Surya Nepal [and five others]
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIV, 254 p. 130 illus., 91 illus. in color.)
Disciplina 005.7
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Society & social sciences
Big data
Educational equipment & technology, computer-aided learning (CAL)
ISBN 3-030-59612-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Research Track -- Entropy-based Approach to Efficient Cleaning of Big Data in Hierarchical Databases -- A Performance Prediction Model for Spark Applications -- Predicting the DJIA with news headlines and historic data using hybrid genetic algorithm/support vector regression and BERT -- Big Data Applications on Large-Scale Infrastructures -- Fake News Classification of Social Media through Sentiment Analysis -- Scalable reference genome assembly from compressed pan-genome index with Spark -- A Web Application for Feral Cat Recognition through Deep Learning -- MCF:Towards Window-based Multiple Cuckoo Filters in Stream Computing -- A Data-Driven Method for Dynamic OD Passenger Flow Matrix Estimation in Urban Metro Systems -- Ensemble learning for heterogeneous missing data imputation -- Validating Goal-Oriented Hypotheses of Business Problems Using Machine Learning: An Exploratory Study of Customer Churn -- The collaborative influence of multiple interactions on successive POI recommendation -- Application Track -- Chemical XAI to Discover Probable Compounds' Spaces based on Mixture of Multiple Mutated Exemplars and Bioassay Existence Ratio -- Clinical Trials Data Management in the Big Data Era -- Cross-Cancer Genome Analysis on Cancer Classification Using Both Unsupervised and Supervised Approaches -- Heavy Vehicle Classification through Deep Learning -- Short Paper Track -- Spatial Association Pattern Mining using In-Memory Computational Framework -- Dissecting Biological Functions for BRCA Genes and their Targeting MicroRNAs within Eight Clusters.
Record Nr. UNISA-996418282003316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain – ICBC 2019 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang
Blockchain – ICBC 2019 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 221 p. 84 illus., 66 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Information storage and retrieval
Artificial intelligence
Coding theory
Information theory
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Information Storage and Retrieval
Artificial Intelligence
Coding and Information Theory
ISBN 3-030-23404-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain: an empirical investigation of its scope for improvement -- Establishing Standards for Consensus on Blockchains -- An Experimental Evaluation of BFT Protocols for Blockchains -- Layered Consensus Mechanism in Consortium Blockchain for Enterprise Services -- Digital-Physical Parity for Food Fraud Detection -- Blockchain Interoperable Digital Objects -- Patient Privacy and Ownership of Electronic Health Records on a Blockchain -- Blockchain Federation for Complex Distributed Applications -- Enriching Smart Contracts with Temporal Aspects -- CloudAgora: Democratizing the Cloud -- Dual Token Blockchain Economy Framework, The Garment Use case -- Performance Benchmarking and Optimization for Blockchain: A Survey -- Developing a Vehicle Networking Platform based on Blockchain Technology -- Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone -- Performance Evaluation of Hyperledger Fabric with Malicious Behavior. .
Record Nr. UNISA-996466322303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain – ICBC 2019 : Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang
Blockchain – ICBC 2019 : Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedings / / edited by James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 221 p. 84 illus., 66 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer organization
Computers
Information storage and retrieval
Artificial intelligence
Coding theory
Information theory
Systems and Data Security
Computer Systems Organization and Communication Networks
Computing Milieux
Information Storage and Retrieval
Artificial Intelligence
Coding and Information Theory
ISBN 3-030-23404-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain: an empirical investigation of its scope for improvement -- Establishing Standards for Consensus on Blockchains -- An Experimental Evaluation of BFT Protocols for Blockchains -- Layered Consensus Mechanism in Consortium Blockchain for Enterprise Services -- Digital-Physical Parity for Food Fraud Detection -- Blockchain Interoperable Digital Objects -- Patient Privacy and Ownership of Electronic Health Records on a Blockchain -- Blockchain Federation for Complex Distributed Applications -- Enriching Smart Contracts with Temporal Aspects -- CloudAgora: Democratizing the Cloud -- Dual Token Blockchain Economy Framework, The Garment Use case -- Performance Benchmarking and Optimization for Blockchain: A Survey -- Developing a Vehicle Networking Platform based on Blockchain Technology -- Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone -- Performance Evaluation of Hyperledger Fabric with Malicious Behavior. .
Record Nr. UNINA-9910337836603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (297 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-031-23690-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynote Addresses -- The Rise of Cyber Physical Security -- Research and Engineering Challenges of Blockchain and Web3 -- Security and Privacy in Federated Learning -- Web3 and the Interoperability of Asset Networks -- Abstracts of Invited Addresses -- Securing Cyber-Physical and IoT Systems in Smart Living Environments -- Advanced Persistent Threats: A Study in Indian Context -- Technology Transfer from Security Research Projects: A Personal Perspective -- Contents -- Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection -- 1 Introduction -- 2 Problem Description -- 3 Approach and Architecture -- 3.1 Tagged Provenance Graphs -- 3.2 Identifying Similar Nodes -- 3.3 Edge Label Similarity -- 3.4 Graph Similarity Detection -- 4 Evaluation -- 4.1 Ostinato Efficacy -- 4.2 Node Similarity Accuracy -- 4.3 Run-Time Performance -- 4.4 Threat Alert Fatigue Mitigation -- 4.5 Comparison with Other Tools -- 5 Related Work -- 6 Conclusion -- References -- DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure -- 1 Introduction -- 2 Related Work -- 3 DKS-PKI Architecture -- 3.1 Overview -- 3.2 Node Operations -- 3.3 Authoritative Signing Keys (ASKs) -- 3.4 Certificate Registration/Issuance and Storage -- 3.5 Certificate Distribution -- 3.6 Certificate Revocation -- 3.7 Stored-Data Validation -- 4 Evaluation -- 4.1 Security Analysis -- 4.2 Implementation -- 4.3 Experimental Environment -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage -- 1 Introduction -- 2 Background and Related Work -- 2.1 Linkage with Bloom Filters -- 2.2 Hardening Bloom Filters -- 2.3 Privacy Measures -- 3 Generating-Sets and Amplification -- 3.1 Generating-Set Amplification Factor.
3.2 Amplification Factor in Deterministic Methods -- 3.3 Amplification Factor in Probabilistic Methods -- 4 Parameter Selection in Probabilistic Methods -- 5 Empirical Evaluation -- 5.1 Setup -- 5.2 Bit Frequency Measures -- 5.3 Generating-Set Amplification Factor -- 5.4 Linkage Quality -- 5.5 Discussion -- 6 Conclusion and Future Work -- References -- .26em plus .1em minus .1emSHIELD: A Multimodal Deep Learning Framework for Android Malware Detection -- 1 Introduction -- 2 Related Work -- 2.1 Static Analysis Based Android Malware Detection Techniques -- 2.2 Dynamic Analysis Based Android Malware Detection Techniques -- 2.3 Hybrid Analysis Based Android Malware Detection Techniques -- 3 SHIELD: The Proposed Framework -- 3.1 Feature Extraction -- 3.2 Markov Image Generation -- 3.3 Network Construction -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Evaluation Environment -- 4.3 Performance Analysis Based Markov Images Separately -- 4.4 Performance Analysis Based on Multimodal Latent Features -- 4.5 Unknown Malware Family Detection -- 4.6 Backdoor Analysis -- 4.7 Comparison with State-of-the-Art Work -- 5 Conclusion and Future Work -- References -- Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes -- 1 Introduction -- 2 Related Work -- 3 Need for a Unified Model -- 4 Preliminaries -- 4.1 Readers-Writers Flow Model -- 5 Samyukta: A Unified Access Control Model -- 5.1 Formal Specification -- 5.2 Request Flow in Samyukta -- 5.3 Authorization Procedure -- 6 Effectiveness of Samyukta -- 6.1 Merits of Samyukta -- 7 Experimental Analysis -- 8 Conclusions -- References -- Efficient and Effective Static Android Malware Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Set -- 3.3 Machine Learning Classifier -- 3.4 Evaluation.
4 Comparison with Existing Approaches -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Attacks on ML Systems: From Security Analysis to Attack Mitigation -- 1 Introduction -- 2 ML Systems and Attacks -- 2.1 ML Systems Have Three Main Perspectives -- 2.2 Adversarial Attacks -- 3 Security Analysis Requirements of ML Systems -- 3.1 ML System Security Analysis Requirements -- 3.2 Limitations of Prior Work on ML Security Analysis -- 4 Proposed Approach -- 4.1 The AI Security Causality Graph -- 4.2 The ML System Dependency Graph -- 4.3 Using the ML-SSA Approach to Analyze the Word Translation Attacks -- 5 AI Security Analysis and Attack Mitigation -- 5.1 Using the Example Word-to-Word Translation ML System to Illustrate Relevant Mitigation Strategies -- 6 Conclusion and Future Directions -- References -- MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Federated Learning -- 2.2 Shapley Value -- 2.3 Inference Attacks -- 3 Threat Model -- 4 MILSA: The Proposed Attack -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 The Proposed Defense -- 7 Conclusion -- References -- IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics -- 1 Introduction -- 2 Related Works -- 3 IoTInDet Methodology -- 3.1 Class Scatter Ratio Based Feature Selection -- 3.2 Hellinger Distance Chart Generation -- 3.3 IoT Normal Traffic Description -- 3.4 IoT Traffic Intrusion Detection -- 4 Experimental Results -- 5 Conclusion -- References -- Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD) -- 1 Introduction -- 2 Related Work -- 3 Cloud-Based DDoS Attacks -- 4 Out-Cloud Attack Cases in Cloud -- 4.1 An Attacker in the Cloud -- 4.2 A Reflector Server in the Cloud.
5 Out-Cloud Attack Detection (OCAD) -- 5.1 Traffic Directions -- 5.2 Virtual Interfaces vs Real Interfaces -- 5.3 Case 1: An Attacker in the Cloud -- 5.4 Case 2: A Reflector Server in the Cloud -- 5.5 OCAD Modules -- 6 Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Amplification Attack -- 6.3 Reflection Attack -- 6.4 Experimental Results -- 7 Discussion -- 8 Conclusions -- References -- Mining Attribute-Based Access Control Policies -- 1 Introduction -- 2 Overview of ABAC -- 3 Related Work -- 4 ABAC Policy Extraction -- 4.1 Policy Mining -- 4.2 Policy Extraction Using Machine Learning -- 5 Experimental Evaluation -- 5.1 Performance of Policy Mining Approach -- 5.2 Performance of ABAC Policies with Constraints -- 5.3 Performance of Policy Extraction Using Machine Learning -- 6 Conclusion -- References -- Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling -- 1 Introduction -- 2 Background -- 2.1 A Brief Introduction to IFC -- 2.2 Dynamic Labelling (DL) Algorithm ch12secrypt18,ch12ghosal2018compile -- 2.3 Readers-Writers Flow Model (RWFM) ch12kumar2017complete -- 3 Security Challenges and Our Approach -- 3.1 Flow Sensitivity -- 3.2 Termination Sensitivity -- 3.3 Eval Statement -- 3.4 Declassification -- 4 Solution for Preventing Privacy-Violating Flows -- 5 Related Work -- 6 Conclusions and Future Work -- References -- On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Demand Manipulation Attacks -- 2.2 Anomaly Detection Mechanism -- 2.3 Related Work -- 3 Methodology -- 3.1 Power Consumption Data -- 3.2 Model Training -- 3.3 Anomaly Score -- 3.4 Thresholding Mechanism -- 3.5 Attack Profiles -- 4 Threshold Selection -- 4.1 The Threshold Dilemma -- 5 Model Tolerance and Impact -- 6 Conclusion and Future Work.
References -- WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Saturation Attack Detection -- 3.2 Attack Mitigation -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Implementation and Evaluation -- 4.1 System Setup -- 4.2 Evaluation -- 4.3 Measurement Study -- 4.4 Comparison with Existing Tools -- 5 Conclusion -- References -- WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection -- 1 Introduction -- 2 Impact Study -- 3 Detecting Attacks -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910634049003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Information systems security : 8th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, proceedings / / edited by Venkata Ramana Badarla, Surya Nepal, and Rudrapatna K. Shyamasundar
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (297 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-031-23690-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynote Addresses -- The Rise of Cyber Physical Security -- Research and Engineering Challenges of Blockchain and Web3 -- Security and Privacy in Federated Learning -- Web3 and the Interoperability of Asset Networks -- Abstracts of Invited Addresses -- Securing Cyber-Physical and IoT Systems in Smart Living Environments -- Advanced Persistent Threats: A Study in Indian Context -- Technology Transfer from Security Research Projects: A Personal Perspective -- Contents -- Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection -- 1 Introduction -- 2 Problem Description -- 3 Approach and Architecture -- 3.1 Tagged Provenance Graphs -- 3.2 Identifying Similar Nodes -- 3.3 Edge Label Similarity -- 3.4 Graph Similarity Detection -- 4 Evaluation -- 4.1 Ostinato Efficacy -- 4.2 Node Similarity Accuracy -- 4.3 Run-Time Performance -- 4.4 Threat Alert Fatigue Mitigation -- 4.5 Comparison with Other Tools -- 5 Related Work -- 6 Conclusion -- References -- DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure -- 1 Introduction -- 2 Related Work -- 3 DKS-PKI Architecture -- 3.1 Overview -- 3.2 Node Operations -- 3.3 Authoritative Signing Keys (ASKs) -- 3.4 Certificate Registration/Issuance and Storage -- 3.5 Certificate Distribution -- 3.6 Certificate Revocation -- 3.7 Stored-Data Validation -- 4 Evaluation -- 4.1 Security Analysis -- 4.2 Implementation -- 4.3 Experimental Environment -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage -- 1 Introduction -- 2 Background and Related Work -- 2.1 Linkage with Bloom Filters -- 2.2 Hardening Bloom Filters -- 2.3 Privacy Measures -- 3 Generating-Sets and Amplification -- 3.1 Generating-Set Amplification Factor.
3.2 Amplification Factor in Deterministic Methods -- 3.3 Amplification Factor in Probabilistic Methods -- 4 Parameter Selection in Probabilistic Methods -- 5 Empirical Evaluation -- 5.1 Setup -- 5.2 Bit Frequency Measures -- 5.3 Generating-Set Amplification Factor -- 5.4 Linkage Quality -- 5.5 Discussion -- 6 Conclusion and Future Work -- References -- .26em plus .1em minus .1emSHIELD: A Multimodal Deep Learning Framework for Android Malware Detection -- 1 Introduction -- 2 Related Work -- 2.1 Static Analysis Based Android Malware Detection Techniques -- 2.2 Dynamic Analysis Based Android Malware Detection Techniques -- 2.3 Hybrid Analysis Based Android Malware Detection Techniques -- 3 SHIELD: The Proposed Framework -- 3.1 Feature Extraction -- 3.2 Markov Image Generation -- 3.3 Network Construction -- 4 Experimental Evaluation -- 4.1 Dataset -- 4.2 Evaluation Environment -- 4.3 Performance Analysis Based Markov Images Separately -- 4.4 Performance Analysis Based on Multimodal Latent Features -- 4.5 Unknown Malware Family Detection -- 4.6 Backdoor Analysis -- 4.7 Comparison with State-of-the-Art Work -- 5 Conclusion and Future Work -- References -- Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes -- 1 Introduction -- 2 Related Work -- 3 Need for a Unified Model -- 4 Preliminaries -- 4.1 Readers-Writers Flow Model -- 5 Samyukta: A Unified Access Control Model -- 5.1 Formal Specification -- 5.2 Request Flow in Samyukta -- 5.3 Authorization Procedure -- 6 Effectiveness of Samyukta -- 6.1 Merits of Samyukta -- 7 Experimental Analysis -- 8 Conclusions -- References -- Efficient and Effective Static Android Malware Detection Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Set -- 3.3 Machine Learning Classifier -- 3.4 Evaluation.
4 Comparison with Existing Approaches -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Attacks on ML Systems: From Security Analysis to Attack Mitigation -- 1 Introduction -- 2 ML Systems and Attacks -- 2.1 ML Systems Have Three Main Perspectives -- 2.2 Adversarial Attacks -- 3 Security Analysis Requirements of ML Systems -- 3.1 ML System Security Analysis Requirements -- 3.2 Limitations of Prior Work on ML Security Analysis -- 4 Proposed Approach -- 4.1 The AI Security Causality Graph -- 4.2 The ML System Dependency Graph -- 4.3 Using the ML-SSA Approach to Analyze the Word Translation Attacks -- 5 AI Security Analysis and Attack Mitigation -- 5.1 Using the Example Word-to-Word Translation ML System to Illustrate Relevant Mitigation Strategies -- 6 Conclusion and Future Directions -- References -- MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Federated Learning -- 2.2 Shapley Value -- 2.3 Inference Attacks -- 3 Threat Model -- 4 MILSA: The Proposed Attack -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Results -- 6 The Proposed Defense -- 7 Conclusion -- References -- IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics -- 1 Introduction -- 2 Related Works -- 3 IoTInDet Methodology -- 3.1 Class Scatter Ratio Based Feature Selection -- 3.2 Hellinger Distance Chart Generation -- 3.3 IoT Normal Traffic Description -- 3.4 IoT Traffic Intrusion Detection -- 4 Experimental Results -- 5 Conclusion -- References -- Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD) -- 1 Introduction -- 2 Related Work -- 3 Cloud-Based DDoS Attacks -- 4 Out-Cloud Attack Cases in Cloud -- 4.1 An Attacker in the Cloud -- 4.2 A Reflector Server in the Cloud.
5 Out-Cloud Attack Detection (OCAD) -- 5.1 Traffic Directions -- 5.2 Virtual Interfaces vs Real Interfaces -- 5.3 Case 1: An Attacker in the Cloud -- 5.4 Case 2: A Reflector Server in the Cloud -- 5.5 OCAD Modules -- 6 Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Amplification Attack -- 6.3 Reflection Attack -- 6.4 Experimental Results -- 7 Discussion -- 8 Conclusions -- References -- Mining Attribute-Based Access Control Policies -- 1 Introduction -- 2 Overview of ABAC -- 3 Related Work -- 4 ABAC Policy Extraction -- 4.1 Policy Mining -- 4.2 Policy Extraction Using Machine Learning -- 5 Experimental Evaluation -- 5.1 Performance of Policy Mining Approach -- 5.2 Performance of ABAC Policies with Constraints -- 5.3 Performance of Policy Extraction Using Machine Learning -- 6 Conclusion -- References -- Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling -- 1 Introduction -- 2 Background -- 2.1 A Brief Introduction to IFC -- 2.2 Dynamic Labelling (DL) Algorithm ch12secrypt18,ch12ghosal2018compile -- 2.3 Readers-Writers Flow Model (RWFM) ch12kumar2017complete -- 3 Security Challenges and Our Approach -- 3.1 Flow Sensitivity -- 3.2 Termination Sensitivity -- 3.3 Eval Statement -- 3.4 Declassification -- 4 Solution for Preventing Privacy-Violating Flows -- 5 Related Work -- 6 Conclusions and Future Work -- References -- On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Demand Manipulation Attacks -- 2.2 Anomaly Detection Mechanism -- 2.3 Related Work -- 3 Methodology -- 3.1 Power Consumption Data -- 3.2 Model Training -- 3.3 Anomaly Score -- 3.4 Thresholding Mechanism -- 3.5 Attack Profiles -- 4 Threshold Selection -- 4.1 The Threshold Dilemma -- 5 Model Tolerance and Impact -- 6 Conclusion and Future Work.
References -- WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Saturation Attack Detection -- 3.2 Attack Mitigation -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Implementation and Evaluation -- 4.1 System Setup -- 4.2 Evaluation -- 4.3 Measurement Study -- 4.4 Comparison with Existing Tools -- 5 Conclusion -- References -- WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection -- 1 Introduction -- 2 Impact Study -- 3 Detecting Attacks -- 4 Experiments and Evaluation -- 5 Conclusion -- References -- Author Index.
Record Nr. UNISA-996503470303316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Service-Oriented Computing--ICSOC 2013 Workshops [[electronic resource] ] : CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers / / edited by Alessio Lomuscio, Surya Nepal, Fabio Patrizi, Boualem Benatallah, Ivona Brandić
Service-Oriented Computing--ICSOC 2013 Workshops [[electronic resource] ] : CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers / / edited by Alessio Lomuscio, Surya Nepal, Fabio Patrizi, Boualem Benatallah, Ivona Brandić
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 586 p. 220 illus.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Software engineering
Application software
Information technology
Business—Data processing
Management information systems
Computer science
Software Engineering
Information Systems Applications (incl. Internet)
IT in Business
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Computer Science, general
ISBN 3-319-06859-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Engineering Service-Oriented Applications WESOA 2013 -- Introduction to the 9th International Workshop on Engineering Service-Oriented Applications (WESOA’13) -- From Process Models to Business Process Architectures: Connecting the Layers -- Goal-Driven Composition of Business Process Models -- Integrating Service Release Management with Service Solution Design -- Practical Compiler-Based User Support during the Development of Business Processes -- Model Checking GSM-Based Multi-Agent Systems -- Towards Modeling and Execution of Collective Adaptive Systems -- A Requirements-Based Model for Effort Estimation in Service-Oriented Systems -- Augmenting Complex Problem Solving with Hybrid Compute Units -- Towards Automating the Detection of Event Sources -- Discovering Pattern-Based Mediator Services from Communication Logs -- Cloud Service Brokerage CSB 2013 -- Cloud Service Brokerage - 2013: Methods and Mechanisms -- A Comparison Framework and Review of Service Brokerage Solutions for Cloud Architectures -- Brokerage for Quality Assurance and Optimisation of Cloud Services: An Analysis of Key Requirements -- Towards Value-Driven Business Modelling Based on Service Brokerage -- Introducing Policy-Driven Governance and Service Level Failure Mitigation in Cloud Service Brokers: Challenges Ahead -- Model-Based Testing in Cloud Brokerage Scenarios -- Value-Added Modelling and Analysis in Service Value Brokerage -- Semantic Web Enabled Software Engineering SWESE 2013 -- Introduction to the Proceedings of the 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE) 2013 -- Management of Variability in Modular Ontology Development -- Towards Automated Service Matchmaking and Planning for Multi-Agent Systems with OWL-S – Approach and Challenges -- Re-engineering the ISO 15926 Data Model: A Multi-level Metamodel Perspective -- Fluent Calculus-Based Semantic Web Service Composition and Verification Using WSSL -- Template-Based Ontology Population for Smart Environments Configuration -- Cloud Computing and Scientific Applications CCSA 2013 -- Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA’13) -- SLA-Aware Load Balancing in a Web-Based Cloud System over OpenStack -- Are Public Clouds Elastic Enough for Scientific Computing? -- A Light-Weight Framework for Bridge-Building from Desktop to Cloud -- Planning and Scheduling Data Processing Workflows in the Cloud with Quality-of-Data Constraints -- Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud -- SciLightning: A Cloud Provenance-Based Event Notification for Parallel Workflows -- Energy Savings on a Cloud-Based Opportunistic Infrastructure -- Pervasive Analytical Service Clouds for the Enterprise and Beyond PACEB 2013 -- Introduction to the Proceedings of the Workshop on Pervasive -- Analytical Service Clouds for the Enterprise and Beyond (PASCEB) 2013 -- Towards a Formal Model for Cloud Computing -- An Optimized Strategy for Data Service Response with Template-Based Caching and Compression -- Model-Driven Event Query Generation for Business Process Monitoring -- Enabling Semantic Complex Event Processing in the Domain of Logistics -- Towards Self-adaptation Planning for Complex Service-Based Systems -- Towards an Integration Platform for Bioinformatics Services -- Requirements to Pervasive System Continuous Deployment -- Towards Structure-Based Quality Awareness in Software Ecosystem Use -- An Adaptive Enterprise Service Bus Infrastructure for Service Based Systems -- Dynamic Adaptation of Business Process Based on Context Changes: A Rule-Oriented Approach -- Flexible Component Migration in an OSGi Based Pervasive Cloud Infrastructure -- Hybrid Emotion Recognition Using Semantic Similarity -- PhD Symposium -- ICSOC PhD Symposium 2013 -- Towards the Automated Synthesis of Data Dependent Service Controllers -- Multi-agent Approach for Managing Workflows in an Inter-Cloud Environment -- An Information-Centric System for Building the Web of Things -- Testing of Distributed Service-Oriented Systems -- Automation of the SLA Life Cycle in Cloud Computing -- Towards a Dynamic Declarative Service Workflow Reference Model -- A Context-Aware Access Control Framework for Software Services -- Description and Composition of Services towards the Web-Telecom Convergence.
Record Nr. UNISA-996214045903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Service-Oriented Computing--ICSOC 2013 Workshops : CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers / / edited by Alessio Lomuscio, Surya Nepal, Fabio Patrizi, Boualem Benatallah, Ivona Brandić
Service-Oriented Computing--ICSOC 2013 Workshops : CCSA, CSB, PASCEB, SWESE, WESOA, and PhD Symposium, Berlin, Germany, December 2-5, 2013. Revised Selected Papers / / edited by Alessio Lomuscio, Surya Nepal, Fabio Patrizi, Boualem Benatallah, Ivona Brandić
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XIV, 586 p. 220 illus.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Software engineering
Application software
Information technology
Business—Data processing
Management information systems
Computer science
Software Engineering
Information Systems Applications (incl. Internet)
IT in Business
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Computer Science, general
ISBN 3-319-06859-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Engineering Service-Oriented Applications WESOA 2013 -- Introduction to the 9th International Workshop on Engineering Service-Oriented Applications (WESOA’13) -- From Process Models to Business Process Architectures: Connecting the Layers -- Goal-Driven Composition of Business Process Models -- Integrating Service Release Management with Service Solution Design -- Practical Compiler-Based User Support during the Development of Business Processes -- Model Checking GSM-Based Multi-Agent Systems -- Towards Modeling and Execution of Collective Adaptive Systems -- A Requirements-Based Model for Effort Estimation in Service-Oriented Systems -- Augmenting Complex Problem Solving with Hybrid Compute Units -- Towards Automating the Detection of Event Sources -- Discovering Pattern-Based Mediator Services from Communication Logs -- Cloud Service Brokerage CSB 2013 -- Cloud Service Brokerage - 2013: Methods and Mechanisms -- A Comparison Framework and Review of Service Brokerage Solutions for Cloud Architectures -- Brokerage for Quality Assurance and Optimisation of Cloud Services: An Analysis of Key Requirements -- Towards Value-Driven Business Modelling Based on Service Brokerage -- Introducing Policy-Driven Governance and Service Level Failure Mitigation in Cloud Service Brokers: Challenges Ahead -- Model-Based Testing in Cloud Brokerage Scenarios -- Value-Added Modelling and Analysis in Service Value Brokerage -- Semantic Web Enabled Software Engineering SWESE 2013 -- Introduction to the Proceedings of the 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE) 2013 -- Management of Variability in Modular Ontology Development -- Towards Automated Service Matchmaking and Planning for Multi-Agent Systems with OWL-S – Approach and Challenges -- Re-engineering the ISO 15926 Data Model: A Multi-level Metamodel Perspective -- Fluent Calculus-Based Semantic Web Service Composition and Verification Using WSSL -- Template-Based Ontology Population for Smart Environments Configuration -- Cloud Computing and Scientific Applications CCSA 2013 -- Introduction to the 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA’13) -- SLA-Aware Load Balancing in a Web-Based Cloud System over OpenStack -- Are Public Clouds Elastic Enough for Scientific Computing? -- A Light-Weight Framework for Bridge-Building from Desktop to Cloud -- Planning and Scheduling Data Processing Workflows in the Cloud with Quality-of-Data Constraints -- Galaxy + Hadoop: Toward a Collaborative and Scalable Image Processing Toolbox in Cloud -- SciLightning: A Cloud Provenance-Based Event Notification for Parallel Workflows -- Energy Savings on a Cloud-Based Opportunistic Infrastructure -- Pervasive Analytical Service Clouds for the Enterprise and Beyond PACEB 2013 -- Introduction to the Proceedings of the Workshop on Pervasive -- Analytical Service Clouds for the Enterprise and Beyond (PASCEB) 2013 -- Towards a Formal Model for Cloud Computing -- An Optimized Strategy for Data Service Response with Template-Based Caching and Compression -- Model-Driven Event Query Generation for Business Process Monitoring -- Enabling Semantic Complex Event Processing in the Domain of Logistics -- Towards Self-adaptation Planning for Complex Service-Based Systems -- Towards an Integration Platform for Bioinformatics Services -- Requirements to Pervasive System Continuous Deployment -- Towards Structure-Based Quality Awareness in Software Ecosystem Use -- An Adaptive Enterprise Service Bus Infrastructure for Service Based Systems -- Dynamic Adaptation of Business Process Based on Context Changes: A Rule-Oriented Approach -- Flexible Component Migration in an OSGi Based Pervasive Cloud Infrastructure -- Hybrid Emotion Recognition Using Semantic Similarity -- PhD Symposium -- ICSOC PhD Symposium 2013 -- Towards the Automated Synthesis of Data Dependent Service Controllers -- Multi-agent Approach for Managing Workflows in an Inter-Cloud Environment -- An Information-Centric System for Building the Web of Things -- Testing of Distributed Service-Oriented Systems -- Automation of the SLA Life Cycle in Cloud Computing -- Towards a Dynamic Declarative Service Workflow Reference Model -- A Context-Aware Access Control Framework for Software Services -- Description and Composition of Services towards the Web-Telecom Convergence.
Record Nr. UNINA-9910483013303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social Media for Government Services / / edited by Surya Nepal, Cécile Paris, Dimitrios Georgakopoulos
Social Media for Government Services / / edited by Surya Nepal, Cécile Paris, Dimitrios Georgakopoulos
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (411 p.)
Disciplina 004
Soggetto topico Application software
Computer Appl. in Social and Behavioral Sciences
ISBN 3-319-27237-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Social Media in Government Services: An Introduction -- Use of Social Media for Internal Communication: A Case Study in a Government Organisation -- Social Media Policy in Turkish Municipalities: Disparity between Awareness and Implementation -- Detecting Bursty Topics of Correlated News and Twitter for Government Services -- Gamification on the Social Web -- A Lexical Resource for Identifying Public Services Names on the Social Web -- Multi-Hazard Detection by Integrating Social Media and Physical Sensors.
Record Nr. UNINA-9910299260303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui