top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2004 Computing Frontier Conference April 14-16, 2004, Ischia, Italy
2004 Computing Frontier Conference April 14-16, 2004, Ischia, Italy
Autore Vassiliadis Stamatis
Pubbl/distr/stampa New York NY, : ACM Press, 2004
Descrizione fisica 1 online resource (522 p.;)
Disciplina 004
Collana ACM Conferences
Soggetto topico Computer science
Information technology
Computer networks
Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti CF '04
Record Nr. UNINA-9910375844003321
Vassiliadis Stamatis  
New York NY, : ACM Press, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Computational and Communication Paradigms : Proceedings of ICACCP 2023
Advanced Computational and Communication Paradigms : Proceedings of ICACCP 2023
Autore Borah Samarjeet
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 online resource (536 pages)
Disciplina 004
Altri autori (Persone) GandhiTapan K
PiuriVincenzo
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9942-84-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Soft Computing and Machine Learning -- Performance Analysis of Clustering Using Modified Grey Wolf Optimization -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 4 Results and Discussions -- 5 Conclusion -- References -- Designing of Advanced Machine Learning-Based Predictive Model for Maternal Mortality -- 1 Introduction -- 2 Literature Review -- 3 Proposed Predictive Model -- 3.1 Overview of the Proposed System -- 3.2 Data Acquisition -- 3.3 Data Preprocessing -- 3.4 Proposed Model -- 3.5 Model Design -- 4 Result and Discussion -- 5 Conclusion -- References -- Multi-criteria-Based Page Ranking Using Metaheuristic Swarm Optimization -- 1 Introduction -- 1.1 Problem Statement -- 2 Related Work -- 2.1 Observations from the Literature -- 3 Proposed PSO-Based Approach -- 3.1 Particle Swarm Optimization (PSO) -- 4 Proposed Approach -- 4.1 Existing Page Ranking Algorithm Comparison -- 5 Result and Discussion -- 6 Conclusion -- References -- ps: [/EMC pdfmark [/objdef Equ /Subtype /Span /ActualText (k) /StPNE pdfmark [/StBMC pdfmarkto.ps: [/EMC pdfmark [/Artifact < -- < -- /Type /Pagination> -- > -- /BDC pdfmark kps: [/EMC pdfmark [/StBMC pdfmark ps: [/EMC pdfmark [/StPop pdfmark [/StBMC pdfmark-NN-SSc: An Effective Similarity Score for ps: [/EMC pdfmark [/objdef Equ /Subtype /Span /ActualText (k) /StPNE pdfmark [/StBMC pdfmarkto.ps: [/EMC pdfmark [/Artifact < -- < -- /Type /Pagination> -- > -- /BDC pdfmark kps: [/EMC pdfmark [/StBMC pdfmark ps: [/EMC pdfmark [/ -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Working Example -- 4 Experimental Results -- 4.1 Performance Analysis Measures -- 4.2 Result Analysis -- 4.3 Discussion -- 5 Conclusion and Future Work -- References -- Password Management System Using Blockchain -- 1 Introduction.
2 Definitions -- 2.1 Blockchain -- 2.2 Transactions -- 2.3 Ethereum -- 2.4 Ether -- 2.5 Ethereum Virtual Machine -- 2.6 Accounts -- 2.7 Storage -- 2.8 Memory -- 2.9 Stack -- 2.10 Message Calls -- 2.11 Smart Contracts -- 2.12 State Variables -- 2.13 Functions -- 3 Related Works -- 4 Problems with Traditional Password Storage Systems -- 5 Solution Strategy -- 5.1 User Operations -- 5.2 Non-functional Requirements -- 6 Implementation -- 6.1 Architecture -- 6.2 Flowcharts -- 6.3 Activity Diagram -- 6.4 Algorithms -- 7 Experimental Results -- 7.1 Software Specifications -- 7.2 The Private Blockchain Network -- 7.3 The Smart Contract -- 7.4 The User Interface -- 8 Conclusion -- 9 Limitations and Future Scope -- References -- Deep Reinforcement Learning Algorithms for D2D Communications: A Comparative Analysis -- 1 Introduction -- 2 Related Work -- 3 System Architecture and Formulation of Problems -- 3.1 Partially Observable Markov Decision Process -- 3.2 Centralized Training Decentralized Execution -- 4 Proposed Algorithm -- 4.1 Deep Q-Network (DQN) -- 4.2 Deep Deterministic Policy Gradient (DDPG) -- 4.3 Quantile Regression Deep Q-Network (QR-DQN) -- 4.4 Channel Model -- 5 Simulation Result and Discussion -- 6 Conclusions -- References -- AI-Enabled IDS for Identifying Malicious Traffics in Cloud Systems -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Framework -- 3.2 Dataset -- 3.3 Pre-processing -- 3.4 Feature Selection -- 3.5 Classification Techniques -- 3.6 Proposed Model -- 3.7 Proposed Algorithm -- 4 Experimental Results -- 4.1 Experimental Environment -- 4.2 Evaluation Metrics -- 4.3 Comparative Study -- 5 Conclusion and Future Work -- References -- NITSDN: Development of SDN Dataset for ML-Based Intrusion Detection System -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Data Collection.
3.2 Feature Extraction -- 3.3 Network Traffic Classification -- 4 Result and Discussion -- 4.1 Data Generation for Attack Packets -- 4.2 Performance of ML Classifiers for Multi-class Classification -- 5 Conclusion and Future Work -- References -- Association Rule Mining in Distributed Environment: A Survey -- 1 Introduction -- 2 Association Rule Mining (ARM) -- 2.1 Preliminaries -- 3 Association Rule Mining in Distributed Environment -- 4 Literature Survey -- 4.1 Apriori-Based Algorithms Over Distributed Environment -- 4.2 FP-Growth-Based Algorithms Over Distributed Environment -- 5 Discussion -- 6 Conclusion -- References -- Performance Analysis of the AdaGrad Family of Algorithms -- 1 Introduction -- 2 Related Work -- 3 Data Creation and Collection -- 4 Methodology -- 4.1 AdaGrad Family of Algorithms -- 5 Learning Schedule -- 6 Evaluation Metrics -- 7 Results and Discussion -- 8 Conclusion -- References -- Time-Related Natural Language Query Handling to Extract Autism Spectrum Disorder Information from Temporal Database -- 1 Introduction -- 2 Related Works -- 3 Architecture -- 3.1 Algorithm of Proposed System -- 3.2 Database of the Proposed System -- 4 Limitation and Future Work -- 5 Conclusion -- References -- Emotion-Based Music Recommendation -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Convolutional Neural Networks (CCN) -- 3.2 LSTM-Based Neural Networks -- 3.3 K-Nearest Neighbors Network (K-NN) -- 3.4 Multilayer Perceptron Network (MLP) -- 4 Results -- 5 Conclusion -- References -- A Comprehensive Study on Natural Language Processing, It's Techniques and Advancements in Nepali Language -- 1 Introduction -- 2 Approaches in Natural Language Processing -- 2.1 Rule-Based -- 2.2 Neural Network-Based Approach -- 2.3 Traditional Machine Learning -- 3 Grammars in Natural Language Processing -- 3.1 Context-Free Grammar.
3.2 Constituency Grammar -- 3.3 Dependency Grammar (DG) -- 4 Grammar in Nepali Language -- 5 Natural Language Pipeline -- 5.1 Sentence Segmentation -- 5.2 Word Tokenization -- 5.3 Stemming -- 5.4 Lemmatization -- 5.5 Identifying Stop Words -- 5.6 Dependency Parsing -- 5.7 POS Tagging -- 5.8 Named Entity Recognition -- 5.9 Chunking -- 6 Phases of Natural Language Processing -- 6.1 Lexical Analysis -- 6.2 Syntactic Analysis -- 6.3 Semantic Analysis -- 6.4 Discourse Integration -- 6.5 Pragmatic Analysis -- 7 Conclusions -- References -- Quality Evaluation of Enterprise Architecture Frameworks -- 1 Introduction -- 2 Related Work -- 3 Quality Assessment Framework -- 3.1 Proposed Set of Metrics -- 3.2 Framework-Level Quality Measurements -- 4 Theoretical Validation of the Proposed Set of Quality Assessment Metrics -- 5 Illustration of the Proposed Metrics and Quality Factors with a Case Study -- 6 Conclusion and Future Work -- References -- Natural Language Query Processing System to Extract Autism Spectrum Disorder Information from Database -- 1 Introduction -- 2 Related Works -- 3 Architecture -- 3.1 The Proposed System's Steps -- 4 Database -- 5 Limitation -- 6 Future Work -- 7 Conclusion -- References -- Spiking Neural Network in Computer Vision: Techniques, Tools and Trends -- 1 Introduction -- 2 SNN: State-of-the-Art Architectures -- 3 Neural Coding Strategies -- 3.1 Rate Coding -- 3.2 Latency Coding -- 3.3 Temporal Coding -- 4 Learning Methods -- 4.1 Unsupervised Learning -- 4.2 Supervised Learning -- 5 Applications and Comparison Among Different Methods -- 6 Conclusion -- References -- A Quantitative Study on the FaceNet System -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 One-Shot Learning -- 3.2 Multi-task Cascaded Convolution Neural Networks -- 3.3 Feature Vector Encoding -- 3.4 Triplet Loss Function -- 4 Results and Discussion.
5 Conclusion -- References -- Resampling Strategies for Mitigating Class Imbalance of ASD Dataset on the Performance of Machine Learning Classifiers -- 1 Introduction -- 2 Resampling Strategies -- 2.1 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Comparative Analysis of Minimax Algorithm with Alpha-Beta Pruning Optimization for Chess Engine -- 1 Introduction -- 2 Literature Review -- 2.1 Minimax Algorithm -- 2.2 Alpha-Beta Pruning Algorithm -- 2.3 Proposed Methodology -- 3 Performance Evaluation -- 4 Conclusion -- References -- Biomedical Informatics -- A Modified Microwave Based System Design for Early-Stage Breast Cancer Detection -- 1 Introduction -- 2 Dielectric Breast Structure -- 3 System Design -- 4 Image Reconstruction Algorithm -- 5 Results and Discussion -- 6 Conclusion -- References -- Research Review and Literature Perception Towards Medicinal Plants Classification Using Deep Learning Techniques -- 1 Introduction -- 2 Literature Review on Medicinal Plants Classification -- 2.1 Related Works -- 2.2 Chronological Review -- 2.3 Medicinal Plant Dataset Analysis -- 3 Short Review on Deep Learning-Based Medicinal Plants Classification Approaches -- 3.1 Algorithmic Classification -- 3.2 Types of Medicinal Plants Used in Classification Models -- 3.3 Evaluating the Implementation Tools -- 3.4 Performance Metrics Utilized for Medicinal Plant Classification -- 4 Research Gaps and Challenges on Conventional Medicinal Plants Classification -- 5 Conclusion -- References -- Features Fusion-Based Gait Recognition with Covariate Conditions -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 4 Experimental and Results Analysis -- 5 Conclusion -- References -- Computational Modelling of Glucocerebrosidase Signalling Pathways in Parkinson's Disease -- 1 Introduction -- 2 Related Works -- 3 Methods -- 4 Results.
4.1 Cellular Model of GBA Pathway in Parkinson's Condition.
Record Nr. UNINA-9910746284903321
Borah Samarjeet  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Computing and Intelligent Technologies : Proceedings of ICACIT 2021
Advanced Computing and Intelligent Technologies : Proceedings of ICACIT 2021
Autore Bianchini Monica
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (652 pages)
Altri autori (Persone) PiuriVincenzo
DasSanjoy
ShawRabindra Nath
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-2164-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Advanced Computing and Intelligent Technologies
Record Nr. UNINA-9910497102803321
Bianchini Monica  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Bioinformatics, Multimedia, and Electronics Circuits and Signals [[electronic resource] ] : Proceedings of GUCON 2019 / / edited by Lakhmi C. Jain, Maria Virvou, Vincenzo Piuri, Valentina E. Balas
Advances in Bioinformatics, Multimedia, and Electronics Circuits and Signals [[electronic resource] ] : Proceedings of GUCON 2019 / / edited by Lakhmi C. Jain, Maria Virvou, Vincenzo Piuri, Valentina E. Balas
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xix, 262 pages) : illustrations
Disciplina 004
Collana Advances in Intelligent Systems and Computing
Soggetto topico Electronic circuits
Signal processing
Bioinformatics
Multimedia systems
Electronic Circuits and Systems
Signal, Speech and Image Processing
Computational and Systems Biology
Multimedia Information Systems
ISBN 981-15-0339-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910366604503321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AI and IoT for smart city applications / / edited by Vincenzo Piuri [and three others]
AI and IoT for smart city applications / / edited by Vincenzo Piuri [and three others]
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (xiii, 233 pages)
Disciplina 006.3
Collana Studies in computational intelligence
Soggetto topico Artificial intelligence
Internet of things
Smart cities
ISBN 981-16-7498-1
981-16-7497-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Smart drone controller framework-toward an Internet of drones -- Building of efficient communication system in smart city using wireless sensor network through hybrid optimization technique -- Estimation of range for electric vehicle using fuzzy logic system -- Traffic light control using RFID and deep reinforcement learning -- Driver drowsiness alert system using real-time detection -- Traffic control system for smart city using image processing -- Visual perception for smart city defense administration and intelligent premonition framework based on DNN -- Application of AI/IoT for smart renewable energy management in smart cities -- Eye-gaze based hands free access control system for smart city public interfaces -- Reliability analysis in cyber-physical system using deep learning for smart cities industrial IoT network node -- Multi robot environment exploration using swarm -- AI and blockchain for healthcare data security in smart cities -- Towards the sustainable development of smart cities through cloud computing -- Anomalies detection on attached IoT device at cattle body in smart cities areas using deep learning.
Record Nr. UNINA-9910743378603321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computing, Communication and Learning : Second International Conference, CoCoLe 2023, Warangal, India, August 29-31, 2023, Proceedings
Computing, Communication and Learning : Second International Conference, CoCoLe 2023, Warangal, India, August 29-31, 2023, Proceedings
Autore Panda Sanjaya Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (322 pages)
Altri autori (Persone) RoutRashmi Ranjan
BisiManjubala
SadamRavi Chandra
LiKuan-Ching
PiuriVincenzo
Collana Communications in Computer and Information Science Series
ISBN 3-031-56998-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910847091703321
Panda Sanjaya Kumar  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Science and Intelligent Applications [[electronic resource] ] : Proceedings of ICDSIA 2020 / / edited by Ketan Kotecha, Vincenzo Piuri, Hetalkumar N. Shah, Rajan Patel
Data Science and Intelligent Applications [[electronic resource] ] : Proceedings of ICDSIA 2020 / / edited by Ketan Kotecha, Vincenzo Piuri, Hetalkumar N. Shah, Rajan Patel
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (556 pages)
Disciplina 005.7
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Engineering—Data processing
Data mining
Computer security
Computational Intelligence
Artificial Intelligence
Data Engineering
Data Mining and Knowledge Discovery
Systems and Data Security
ISBN 981-15-4474-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hate Speech Detection: A Bird’s Eye View -- Intrusion Detection System Using Semi-supervised Machine Learning -- A Survey on Machine Learning and Deep Learning based Approaches for Sarcasm Identification in Social Media -- A Machine Learning Algorithm to Predict Financial Investment -- Genetic Algorithm based Task Scheduling for Load Balancing in Cloud -- Experimental Analysis of Measuring Neighbourhood Change in the Presence of Wormhole in Mobile Wireless Sensor Networks -- Privy Cloud/Web Server -- Automating Container Deployments Using CI/CD -- Security and Performance Evaluations of QUIC Protocol -- Comparative Survey of Digital Image Steganography Spatial Domain Techniques -- Automatic Evaluation of Analog Circuit Designs.
Record Nr. UNINA-9910483850203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IEEE Alessandro Volta Memorial Workshop on Low-Power Design : proceedings : March 4-5, 1999, Como, Italy
IEEE Alessandro Volta Memorial Workshop on Low-Power Design : proceedings : March 4-5, 1999, Como, Italy
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 1999
Disciplina 621.39/5
Soggetto topico Low voltage integrated circuits - Design and construction
Electrical & Computer Engineering
Engineering & Applied Sciences
Electrical Engineering
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996217527303316
[Place of publication not identified], : IEEE Computer Society, 1999
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Autore Meng Weizhi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (628 pages)
Disciplina 005.8
Altri autori (Persone) YanZheng
PiuriVincenzo
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 981-9970-32-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Record Nr. UNINA-9910760264603321
Meng Weizhi  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Autore Meng Weizhi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (628 pages)
Disciplina 005.8
Altri autori (Persone) YanZheng
PiuriVincenzo
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 981-9970-32-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Record Nr. UNISA-996565871203316
Meng Weizhi  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui