Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XXVI, 480 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers and civilization Systems and Data Security Computer Communication Networks Cryptology Computers and Society |
ISBN | 3-319-03584-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data. |
Record Nr. | UNISA-996465385903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XXVI, 480 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers and civilization Systems and Data Security Computer Communication Networks Cryptology Computers and Society |
ISBN | 3-319-03584-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data. |
Record Nr. | UNINA-9910483379903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine Learning and Big Data Analytics : 2nd International Conference on Machine Learning and Big Data Analytics-ICMLBDA, IIT Patna, India, March 2022 / / edited by Rajiv Misra, Rana Omer, Muttukrishnan Rajarajan, Bharadwaj Veeravalli, Nishtha Kesswani, Priyanka Mishra |
Autore | Misra Rajiv |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (552 pages) |
Disciplina | 006.31 |
Altri autori (Persone) |
OmerRana
RajarajanMuttukrishnan VeeravalliBharadwaj KesswaniNishtha MishraPriyanka |
Collana | Springer Proceedings in Mathematics & Statistics |
Soggetto topico |
Mathematical statistics
Machine learning Quantitative research Artificial intelligence—Data processing Mathematical Statistics Machine Learning Data Analysis and Big Data Data Science Aprenentatge automàtic Dades massives |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-031-15175-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- A Comprehensive analysis on Mobile Edge Computing: joint offloading and resource allocation perspective -- Finding Significant Project Issues with Machine Learning -- Prediction of Heart Disease using various Data Analysis and Machine learning Techniques -- Artificial Intelligence: Recent Trends, Opportunities and Challenges in Real-World Scenarios -- Bilingual documents text line extraction using Conditional GANs -- Performance Comparison of YOLO Variants for Object Detection in Drone Based Imagery -- A Microservice Architecture with Load Balancing Mechanism in Cloud Environment -- An IoT Application for Detection and Monitoring of Manhole -- Resource Allocation in 5G & Beyond Edge-Slice Networking using Deep Reinforcement Learning -- The Important Influencing Factors in Machine Translation -- Damaged units return Investigation in Printer producing Industry utilizing Big Data -- Colorization of Grayscale Images: An Overview -- Evolutionary Approaches Towards Traditional to Deep Learning Based Chatbot -- Analysis of Machine Learning Algorithms for Detection of Cyber Bullying on Social Networks -- Sentiment Analysis of Political Tweets for Israel using Machine Learning -- A Novel Approach for Real-time Vehicle Re-identification using Content-based Image Retrieval with Relevance Feedback -- Extractive and Abstractive Text Summarization Model fine-tuned based on BERTSUM and Bio-BERT on COVID-19 Open Research Articles -- RevCode for NLP in Indian Languages -- Application for Mood Detection of Students Using TensorFlow and Electron JS -- By Using CNN Technique and Webcam to Identify Face Mask Violation -- A Review on Internet of Things based Cloud Architecture and Its Application -- Prediction of Maneuvering Status for Aerial Vehicles using Supervised Learning Methods -- HRescue: A Modern ML approach for Employee Attrition Prediction -- Using Machine Learning to Detect Botnets in Network Traffic -- Reducing Peak Electricity Demands of a Cluster of Buildings with Multi-agent Reinforcement Learning -- Virus Texture Classification using Genetic Algorithm and Pre-trained Convolutional Neural Networks -- Fog Computing enabled Internet of Things for resource optimization -- Network Media Content Model in the era of Smaft Devices -- Sentimental Analysis of Stock Market via Twitter -- Detection and Classification of Tumor Tissues in Colorectal Cancer using Pathology Images -- Challenges encountered in the implementation of machine learning in the healthcare industry -- Performance Evaluation of Deep Learning Architectures for Recognition of Moisture in Dried Coconut Copra -- Training Generative Adversarial Networks(GANs) over Parameter Server and Worker Node Architecture -- Handwritten Digit Recognition using Neural Network with Gabor Filter for Information Fusion -- FAFOC: Fog Based Energy Efficient Clustering Technique for Wireless Sensor Networks -- Evaluation of Supervised Classifiers for Fake News Detection using Twitter Dataset -- Analysis of Pest Recognition using Lightweight CNN -- Early Prediction of Alzheimer Disease Using Ensemble Learning Models -- Cattle Identification from Muzzle Print Image Pattern Using Hybrid Feature Descriptors and SVM -- Evaluate and Detection of Breast Cancer using Data Mining Models -- Lung Cancer Disease Prediction Using Machine Learning Techniques -- Video to Text Generation Using Sentence Vector and Skip Connections -- Machine Learning Techniques for COVID-19 pandemic updates for Analysis, Visualization and Prediction system -- Design and CFD Analysis of Drone Thrust with Duct -- Index. |
Record Nr. | UNINA-9910729895203321 |
Misra Rajiv | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|