top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (1015 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Cibernètica
Seguretat informàtica
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-79200-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Organization -- General Chairs -- Online Conference Organizing Chairs -- Program Chairs -- Publication Chairs -- Publicity Chairs -- Website and Local Service Chairs -- Program Committee Members -- Welcome Message -- Conference Program at a Glance -- ATCI 2021 Keynotes -- Oral Presentation Instruction -- Registration -- Contents -- Cyber Intelligence for Business and Management Innovations -- Prediction of Total Investment in Fixed Assets Based on the SARIMA Model and X12ARIMA Seasonal Adjustment Method -- 1 Introduction -- 2 Model Establishment and Indicator Description -- 2.1 Data Sources and Related Instruction -- 2.2 Judging Data Seasonality -- 2.3 Model Establishment -- 3 Model Prediction -- 3.1 Analysis and Prediction Using SARIMA Model -- 3.2 X12ARIMA Seasonal Adjustment Method Using Addition -- 3.3 X12ARIMA Seasonal Adjustment Method Using Multiplication -- 3.4 Forecast Results and Comparison of X12ARIMA Seasonal Adjustment Method Using Addition and Multiplication -- 3.5 Automatic Prediction of X12ARIMA Seasonal Adjustment Method Based on R Language -- 4 Conclusion -- References -- Analysis of the Impact of Green Credit on the Operating Efficiency of Listed Commercial Banks Based on Python -- 1 Introduction -- 2 Data and Model -- 2.1 Variable Selection -- 2.2 Data Source -- 2.3 Descriptive Statistical Analysis -- 2.4 Model Setting and Selection -- 2.5 Model Selection -- 3 Conclusions -- References -- The Influence of Computer Network Technology on Trade Development -- 1 Changes of Trade Market Environment under the Background of Internet Development -- 2 Application of Internet Technology in Trade Activities -- 3 The Impact of Internet on the Development of Trade -- 4 Problems in the Application of Internet in Trade -- 5 Improve the Effectiveness of Internet Application in Trade Process -- 6 Conclusion -- References.
The Application of Knowledge Map and the Construction of Enterprise Knowledge Map -- 1 Introduction -- 2 Knowledge Graph and Structure of the Enterprise Information System -- 3 Application of Knowledge Graph -- 3.1 Problem Solving -- 3.2 Network Security -- 3.3 Intelligent Application -- 4 Construction of Knowledge Map -- 4.1 Knowledge Extraction -- 4.2 Knowledge Integration -- 4.3 Developing Knowledge Map -- 5 Conclusion -- References -- Interaction Mechanism of Regional Tourism Industry and Information Industry -- 1 Introduction -- 2 Research Methods -- 3 Evaluation System -- 4 Interaction Mechanism -- 4.1 Stationarity Test -- 4.2 Selection of Lag Order -- 4.3 PVR Model Estimation -- 4.4 The Dynamic Response of Tourism Industry and Information Industry -- 4.5 Analysis of Variance -- 5 Conclusion -- References -- Service Quality Evaluation of Office Property Management Based on SERVQUAL Model -- 1 Introduction -- 2 Related theories of Office Property Management Service Quality -- 3 Establishment of Service Quality Index System -- 3.1 Index Selection -- 3.2 Weight Determination -- 3.3 The Square Root Method is Used to Calculate the Eigenvector and Weight -- 3.4 Evaluate the Service Quality of Office Property Management -- 4 Service Quality Satisfaction and Importance Evaluation -- 5 Conclusions -- References -- Characteristics and Trends of Tourism Informatization Research - Based on Citespace Knowledge Map Analysis -- 1 Introduction -- 2 Research Methods and Data Sources -- 3 Statistics and Analysis -- 3.1 Distribution of Domestic Tourism Information Research -- 3.2 Distribution of Domestic Tourism Information Research Journals -- 3.3 An Analysis of the Frontier Hot Spots of Domestic Tourism Informatization Research -- 3.4 Trajectory and Trend Analysis of Domestic Tourism Informatization Research -- 4 Discussion and Conclusion -- References.
Policy Guarantee for the Development of FinTech Under the Flow of Information Technology in Guangdong-Hong Kong-Macao Greater Bay Area -- 1 Introduction -- 2 Challenges Facing FinTech Development in the Greater Bay Area -- 2.1 The Flow of FinTech Talents is Not Smooth -- 2.2 Cross-Border Logistics Transportation is Not Smooth -- 2.3 The Cross-Border Use of Financial Funds is Not Smooth -- 2.4 The Communication of Information and Data is Not Smooth -- 3 Policy Guarantee for the Development of FinTech in the Greater Bay Area -- 3.1 Administrative Management and Policy Guarantee -- 3.2 Talent Guarantee for the Development of Dawan FinTech -- 3.3 Healthy Competition Guarantee for the Development of Insurance Technology in the Greater Bay Area -- 3.4 Platform Guarantee for FinTech in the Greater Bay Area -- 3.5 Risk Prevention of FinTech in the Greater Bay Area -- 4 Conclusion -- References -- Training Mode of Applied Talents in Tourism Management Specialty Under Artificial Intelligence -- 1 Introduction -- 2 Relevant Concepts -- 2.1 AI Concept -- 2.2 Applied Talents of Tourism Major -- 2.3 Talent Training Mode -- 2.4 Basic Algorithm -- 3 Practical Research on the Talent Training Mode of Tourism Management Major from the Perspective of AI -- 3.1 Subjects -- 3.2 Experimental Steps -- 4 Statistical Analysis of Data -- 4.1 Students' Understanding of AI in Teaching -- 4.2 Students' Experience Based on AI -- 4.3 Assessment Result Analysis -- 5 Conclusion -- References -- Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance -- 1 Research on the Background of Cross-Border E-commerce Payment in China -- 1.1 Traditional Payment Cross-Border E-commerce Platform -- 1.2 Third-Party Payment Cross-Border E-commerce Platform -- 2 Internet Finance Promotes Cross-Border Electronic Payment.
3 Existing Problems and Risk Analysis of Cross-Border E-commerce Payment -- 3.1 Credit System Defects and Payment Credit Risk -- 3.2 Regulatory Risks of Big Data and User Privacy -- 3.3 Risk of Cross-Border Money Laundering and Illegal Flow of Funds -- 3.4 Legal Risks of Cross-Border Electronic Payment -- 4 Strategic Analysis and Development Research of Cross-Border Electronic Payment Industry -- 4.1 Strengthen the Supervision of Cross-Border Electronic Commerce Payment -- 4.2 Improve the Security of Third-Party Payment Information in the Era of Big Data -- 4.3 Improve the Credit Information Work and Establish an Online and Offline Credit Information System -- 4.4 Improve the Access System for Third-Party Cross-Border Payment Services -- 4.5 Attach Importance to and Strengthen Anti-money Laundering Work -- References -- The Construction and Application of Financial Sharing Service Center of Enterprise Group -- 1 The Strategic Significance of Building Financial Sharing Service Center to Strengthen Financial Control of Enterprise Groups -- 2 Principles and Key Points of Financial Sharing Service Center Construction -- 3 Core Systems and System Integration of Financial Shared Service Center Construction -- 4 Management and Control Mode and Expected Effect of Financial Shared Service Center -- 5 Financial Sharing Service Center Construction Risk and Countermeasures -- References -- Analysis on Employment Situation of Applied Universities in Transformation and Development -- 1 Introduction -- 2 Main Factors Affecting the Employment Rate of Colleges and Universities -- 2.1 The Increase of College Enrollment Leads to the Decrease of the Gold Content -- 2.2 The Leading Role of University Education is Challenged by the Development of Internet -- 2.3 The Speed of Knowledge Renewal in Colleges and Universities Lags Behind the Development of Industry.
2.4 The Motive Force for Colleges and Universities to Seek Employment Growth Point is Not Strong -- 2.5 Higher-Educated People are More Attractive to Businesses than Students -- 2.6 The Orientation of Employment of College Students is Not Accurate -- 3 Analysis of Employment Data of Jilin Agricultural Science and Technology Institute -- 4 Exploration of the Work Model Which is Favorable to the Comprehensive Quality Improvement of Employment -- 4.1 Accurate Positioning -- 4.2 Graded Advance -- 4.3 Ideological Guidance -- 4.4 Comprehensive Plan -- 5 Summary and Outlook -- References -- Corpus-Based Comparative Study on Chinese and English Subjectivity -- 1 Introduction -- 1.1 Problem and Research Question -- 1.2 Review of Literature -- 2 Research Methods -- 2.1 The Corpus and Data -- 2.2 Data Collection and Analysis -- 2.3 Results -- 3 Discussion -- 4 Conclusion -- References -- Analysis on the Development of Regional Innovation Ability Driven by Internet Under the Background of "Internet Plus" -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Cost Effect -- 2.2 Competitive Effect -- 2.3 Spillover Effect -- 3 Analysis of Existing Circumstance -- 4 Conclusion and Enlightenment -- References -- Influence Mechanism of Mobile Social Network Users' Product Recommendation Information on Consumers' Intention to Participate Sharing Economy -- 1 Introduction -- 2 Theoretical Bases -- 2.1 Theory of Planned Behavior -- 2.2 Source Credibility Theory -- 3 Influencing Mechanism Analysis -- 3.1 Influencing Mechanism of TPB Factors -- 3.2 Influence Mechanism of Source Credibility Factors -- 3.3 The Theoretical Model -- 4 Management Implication -- 4.1 Improve Consumers' Perception of Source Credibility -- 4.2 Improve Consumers' Perceived Ease-of-Use to Mobile Social Network Apps -- 5 Conclusions -- References -- Optimizing System Management Based on Trust of Domain.
1 Account Management Issues.
Record Nr. UNINA-9910488718803321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced computing and systems for security . Volume 14 / / Rituparna Chaki [and four others], editors
Advanced computing and systems for security . Volume 14 / / Rituparna Chaki [and four others], editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (213 pages)
Disciplina 005.8
Collana Lecture notes in networks and systems
Soggetto topico Computer security
Seguretat informàtica
Models matemàtics
Mineria de dades
Algorismes computacionals
Soggetto genere / forma Llibres electrònics
Congressos
ISBN 981-16-4294-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910734097103321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNINA-9910488693903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNISA-996464519403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Biometric Person Authentication [[electronic resource] ] : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings / / edited by Stan Z. Li, Jianhuang Lai, Tieniu Tan, Guocan Feng, Yunhong Wang
Advances in Biometric Person Authentication [[electronic resource] ] : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings / / edited by Stan Z. Li, Jianhuang Lai, Tieniu Tan, Guocan Feng, Yunhong Wang
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XVIII, 700 p.)
Disciplina 006.4
Collana Lecture Notes in Computer Science
Soggetto topico Pattern recognition
Application software
Multimedia information systems
Special purpose computers
Management information systems
Computer science
Pattern Recognition
Computer Appl. in Social and Behavioral Sciences
Computer Appl. in Administrative Data Processing
Multimedia Information Systems
Special Purpose and Application-Based Systems
Management of Computing and Information Systems
Seguretat informàtica
Reconeixement de formes (Informàtica)
Biometria
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-540-30548-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Biometrics -- Biometrics: When Identity Matters -- Face Recognition: Technical Challenges and Research Directions -- Fingerprints: Recognition, Performance Evaluation and Synthetic Generation -- Recognising Persons by Their Iris Patterns -- Multiple Classifier Fusion for Biometric Authentication -- Performance Evaluation in 1 : 1 Biometric Engines -- Best Performing Biometric Engines -- Discussions on Some Problems in Face Recognition -- Improving Fingerprint Recognition Performance Based on Feature Fusion and Adaptive Registration Pattern -- Iris Recognition Based on Non-local Comparisons -- Palmprint Authentication Technologies, Systems and Applications -- Face Recognition -- Novel Face Detection Method Based on Gabor Features -- Optimal Shape Space and Searching in ASM Based Face Alignment -- Gabor Wavelet-Based Eyes and Mouth Detection Algorithm -- An Entropy-Based Diversity Measure for Classifier Combining and Its Application to Face Classifier Ensemble Thinning -- Estimating the Visual Direction with Two-Circle Algorithm -- Multiple Face Contour Detection Using Adaptive Flows -- Pose Normalization Using Generic 3D Face Model as a Priori for Pose-Insensitive Face Recognition -- Gabor-Based Kernel Fisher Discriminant Analysis for Pose Discrimination -- Robust Pose Estimation of Face Using Genetic Algorithm -- Facial Pose Estimation Based on the Mongolian Race’s Feature Characteristic from a Monocular Image -- Boosting Local Binary Pattern (LBP)-Based Face Recognition -- Gabor Features Based Method Using HDR (G-HDR) for Multiview Face Recognition -- Face Recognition Under Varying Lighting Based on Derivates of Log Image -- A Fast Method of Lighting Estimate Using Multi-linear Algebra -- Face Recognition Using More than One Still Image: What Is More? -- Video-Based Face Recognition Using a Metric of Average Euclidean Distance -- 3D Face Recognition Based on G-H Shape Variation -- 3D Face Recognition Based on Geometrical Measurement -- 3D Face Recognition Using Eigen-Spectrum on the Flattened Facial Surface -- Building a 3D Morphable Face Model by Using Thin Plate Splines for Face Reconstruction -- 3D Surface Reconstruction Based on One Non-symmetric Face Image -- Recent Advances in Subspace Analysis for Face Recognition -- Component-Based Cascade Linear Discriminant Analysis for Face Recognition -- Unified Locally Linear Embedding and Linear Discriminant Analysis Algorithm (ULLELDA) for Face Recognition -- On Dimensionality Reduction for Client Specific Discriminant Analysis with Application to Face Verification -- The Solution Space for Fisher Discriminant Analysis and the Uniqueness Under Constraints -- A Novel One-Parameter Regularized Linear Discriminant Analysis for Solving Small Sample Size Problem in Face Recognition -- Fast Calculation for Fisher Criteria in Small Sample Size Problem -- Vision-Based Face Understanding Technologies and Their Applications -- International Standardization on Face Recognition Technology -- System Design and Assessment Methodology for Face Recognition Algorithms -- Baseline Evaluations on the CAS-PEAL-R1 Face Database -- An Efficient Compression and Reconstruction Method of Face Image for Low Rate Net -- How Can We Reconstruct Facial Image from Partially Occluded or Low-Resolution One? -- A Matrix-Oriented Method for Appearance-Based Data Compression – An Idea from Group Representation Theory -- Fingerprint Recognition -- An Adaptive Fingerprint Post-processing Algorithm Based on Mathematical Morphology -- Fingerprint Image Segmentation by Energy of Gaussian-Hermite Moments -- Robust Ridge Following in Fingerprints -- A New Approach for Fingerprint Minutiae Extraction -- A Top-Down Fingerprint Image Enhancement Method Based on Fourier Analysis -- Fingerprint Templates Combination -- Skeletonization of Fingerprint Based-on Modulus Minima of Wavelet Transform -- Transformation-Variants Estimation Using Similarity Relative Histogram Grouping Model -- A Study of Minutiae Matching Algorithm Based on Orientation Validation -- Cascading a Couple of Registration Methods for a High Accurate Fingerprint Verification System -- A Hierarchical Fingerprint Matching Method Based on Rotation Invariant Features -- Phase-Correlation Based Registration of Swipe Fingerprints -- An Improved Method for Singularity Detection of Fingerprint Images -- Fingerprint Classifier Using Embedded Hidden Markov Models -- A Robust Pseudoridges Extraction Algorithm for Fingerprints -- Iris Recognition -- Iris Image Capture System Design for Personal Identification -- An Iris Segmentation Procedure for Iris Recognition -- Zernike Moment Invariants Based Iris Recognition -- Two-Dimensional Projection and Crossing for Iris Optimal Localization -- Speaker Recognition -- Improvement of Speaker Identification by Combining Prosodic Features with Acoustic Features -- Bimodal Speaker Identification Using Dynamic Bayesian Network -- A Novel Pitch Period Detection Algorithm Based on Hilbert-Huang Transform -- Noisy Speech Pitch Detection Based on Mathematical Morphology and Weighted MACF -- Glottal Information Based Spectral Recuperation in Multi-channel Speaker Recognition -- Speaker Modeling Technique Based on Regression Class for Speaker Identification with Sparse Training -- Other Biometrics -- Some Issues Pertaining to Adaptive Multimodal Biometric Authentication -- Protecting Biometric Data for Personal Identification -- Digital Curvelet Transform for Palmprint Recognition -- On-line Writer Verification Using Force Features of Basic Strokes -- A Novel Force Sensitive Tablet for Handwriting Information Acquisition -- Shape and Structural Feature Based Ear Recognition -- LLE Based Gait Analysis and Recognition -- Personal Identification Using Knuckleprint -- AAM Based Matching of Hand Appearance for User Verification.
Record Nr. UNISA-996466360203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Biometric Person Authentication [[electronic resource] ] : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings / / edited by Stan Z. Li, Jianhuang Lai, Tieniu Tan, Guocan Feng, Yunhong Wang
Advances in Biometric Person Authentication [[electronic resource] ] : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings / / edited by Stan Z. Li, Jianhuang Lai, Tieniu Tan, Guocan Feng, Yunhong Wang
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XVIII, 700 p.)
Disciplina 006.4
Collana Lecture Notes in Computer Science
Soggetto topico Pattern recognition
Application software
Multimedia information systems
Special purpose computers
Management information systems
Computer science
Pattern Recognition
Computer Appl. in Social and Behavioral Sciences
Computer Appl. in Administrative Data Processing
Multimedia Information Systems
Special Purpose and Application-Based Systems
Management of Computing and Information Systems
Seguretat informàtica
Reconeixement de formes (Informàtica)
Biometria
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-540-30548-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Biometrics -- Biometrics: When Identity Matters -- Face Recognition: Technical Challenges and Research Directions -- Fingerprints: Recognition, Performance Evaluation and Synthetic Generation -- Recognising Persons by Their Iris Patterns -- Multiple Classifier Fusion for Biometric Authentication -- Performance Evaluation in 1 : 1 Biometric Engines -- Best Performing Biometric Engines -- Discussions on Some Problems in Face Recognition -- Improving Fingerprint Recognition Performance Based on Feature Fusion and Adaptive Registration Pattern -- Iris Recognition Based on Non-local Comparisons -- Palmprint Authentication Technologies, Systems and Applications -- Face Recognition -- Novel Face Detection Method Based on Gabor Features -- Optimal Shape Space and Searching in ASM Based Face Alignment -- Gabor Wavelet-Based Eyes and Mouth Detection Algorithm -- An Entropy-Based Diversity Measure for Classifier Combining and Its Application to Face Classifier Ensemble Thinning -- Estimating the Visual Direction with Two-Circle Algorithm -- Multiple Face Contour Detection Using Adaptive Flows -- Pose Normalization Using Generic 3D Face Model as a Priori for Pose-Insensitive Face Recognition -- Gabor-Based Kernel Fisher Discriminant Analysis for Pose Discrimination -- Robust Pose Estimation of Face Using Genetic Algorithm -- Facial Pose Estimation Based on the Mongolian Race’s Feature Characteristic from a Monocular Image -- Boosting Local Binary Pattern (LBP)-Based Face Recognition -- Gabor Features Based Method Using HDR (G-HDR) for Multiview Face Recognition -- Face Recognition Under Varying Lighting Based on Derivates of Log Image -- A Fast Method of Lighting Estimate Using Multi-linear Algebra -- Face Recognition Using More than One Still Image: What Is More? -- Video-Based Face Recognition Using a Metric of Average Euclidean Distance -- 3D Face Recognition Based on G-H Shape Variation -- 3D Face Recognition Based on Geometrical Measurement -- 3D Face Recognition Using Eigen-Spectrum on the Flattened Facial Surface -- Building a 3D Morphable Face Model by Using Thin Plate Splines for Face Reconstruction -- 3D Surface Reconstruction Based on One Non-symmetric Face Image -- Recent Advances in Subspace Analysis for Face Recognition -- Component-Based Cascade Linear Discriminant Analysis for Face Recognition -- Unified Locally Linear Embedding and Linear Discriminant Analysis Algorithm (ULLELDA) for Face Recognition -- On Dimensionality Reduction for Client Specific Discriminant Analysis with Application to Face Verification -- The Solution Space for Fisher Discriminant Analysis and the Uniqueness Under Constraints -- A Novel One-Parameter Regularized Linear Discriminant Analysis for Solving Small Sample Size Problem in Face Recognition -- Fast Calculation for Fisher Criteria in Small Sample Size Problem -- Vision-Based Face Understanding Technologies and Their Applications -- International Standardization on Face Recognition Technology -- System Design and Assessment Methodology for Face Recognition Algorithms -- Baseline Evaluations on the CAS-PEAL-R1 Face Database -- An Efficient Compression and Reconstruction Method of Face Image for Low Rate Net -- How Can We Reconstruct Facial Image from Partially Occluded or Low-Resolution One? -- A Matrix-Oriented Method for Appearance-Based Data Compression – An Idea from Group Representation Theory -- Fingerprint Recognition -- An Adaptive Fingerprint Post-processing Algorithm Based on Mathematical Morphology -- Fingerprint Image Segmentation by Energy of Gaussian-Hermite Moments -- Robust Ridge Following in Fingerprints -- A New Approach for Fingerprint Minutiae Extraction -- A Top-Down Fingerprint Image Enhancement Method Based on Fourier Analysis -- Fingerprint Templates Combination -- Skeletonization of Fingerprint Based-on Modulus Minima of Wavelet Transform -- Transformation-Variants Estimation Using Similarity Relative Histogram Grouping Model -- A Study of Minutiae Matching Algorithm Based on Orientation Validation -- Cascading a Couple of Registration Methods for a High Accurate Fingerprint Verification System -- A Hierarchical Fingerprint Matching Method Based on Rotation Invariant Features -- Phase-Correlation Based Registration of Swipe Fingerprints -- An Improved Method for Singularity Detection of Fingerprint Images -- Fingerprint Classifier Using Embedded Hidden Markov Models -- A Robust Pseudoridges Extraction Algorithm for Fingerprints -- Iris Recognition -- Iris Image Capture System Design for Personal Identification -- An Iris Segmentation Procedure for Iris Recognition -- Zernike Moment Invariants Based Iris Recognition -- Two-Dimensional Projection and Crossing for Iris Optimal Localization -- Speaker Recognition -- Improvement of Speaker Identification by Combining Prosodic Features with Acoustic Features -- Bimodal Speaker Identification Using Dynamic Bayesian Network -- A Novel Pitch Period Detection Algorithm Based on Hilbert-Huang Transform -- Noisy Speech Pitch Detection Based on Mathematical Morphology and Weighted MACF -- Glottal Information Based Spectral Recuperation in Multi-channel Speaker Recognition -- Speaker Modeling Technique Based on Regression Class for Speaker Identification with Sparse Training -- Other Biometrics -- Some Issues Pertaining to Adaptive Multimodal Biometric Authentication -- Protecting Biometric Data for Personal Identification -- Digital Curvelet Transform for Palmprint Recognition -- On-line Writer Verification Using Force Features of Basic Strokes -- A Novel Force Sensitive Tablet for Handwriting Information Acquisition -- Shape and Structural Feature Based Ear Recognition -- LLE Based Gait Analysis and Recognition -- Personal Identification Using Knuckleprint -- AAM Based Matching of Hand Appearance for User Verification.
Record Nr. UNINA-9910483432103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNINA-9910502594403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNISA-996464525303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in human factors in robots, unmanned systems and cybersecurity : proceedings of the AHFE 2021 virtual conferences on human factors in robots, drones and unmanned systems, and human factors in cybersecurity, July 25-29, 2021, USA / / Matteo Zallio, Carlos Raymundo Iban̋ez, Jesus Hechavarria Hernandez, editors
Advances in human factors in robots, unmanned systems and cybersecurity : proceedings of the AHFE 2021 virtual conferences on human factors in robots, drones and unmanned systems, and human factors in cybersecurity, July 25-29, 2021, USA / / Matteo Zallio, Carlos Raymundo Iban̋ez, Jesus Hechavarria Hernandez, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (283 pages)
Disciplina 629.8
Collana Lecture Notes in Networks and Systems
Soggetto topico Human-robot interaction
Human engineering
Computer security
Interacció persona-ordinador
Robòtica
Seguretat informàtica
Ergonomia
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-79997-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Advances in Human Factors and Ergonomics 2021 -- Preface -- Contents -- Human Factors and Unmanned Aerial Vehicles -- Concept for Cross-platform Delegation of Heterogeneous UAVs in a MUM-T Environment -- 1 Introduction and Background -- 2 Problem Definition -- 3 Concept -- 4 Implementation and Early Results -- 5 Conclusions and Outlook -- References -- Swarms, Teams, or Choirs? Metaphors in Multi-UAV Systems Design -- 1 Introduction -- 2 The Swarm Metaphor -- 3 The Team Metaphor -- 4 The Choir Metaphor -- 5 Conclusion -- References -- Visual Communication with UAS: Estimating Parameters for Gestural Transmission of Task Descriptions -- 1 Introduction -- 2 Related Work -- 3 Generating Minimal Parameter Sets for UAV Related Tasks -- 3.1 Experiment -- 3.2 Results -- 3.3 Conclusion and Outlook -- References -- A Distributed Mission-Planning Framework for Shared UAV Use in Multi-operator MUM-T Applications -- 1 Introduction and Background -- 2 Related Work -- 3 Application -- 4 Implementation -- 5 Evaluation and Discussion -- 6 Conclusion -- References -- Robots in Transportation Systems -- Conditional Behavior: Human Delegation Mode for Unmanned Vehicles Under Selective Datalink Availability -- 1 Introduction and Background -- 2 Implications of Datalink Loss for Hierarchical Control of UAVs by Humans -- 2.1 HAT Work System Descriptive Language -- 2.2 Commonly Used HAT Work System Design Patterns for UAV Control -- 3 UAVs as Worker and Compensation of Control Gap -- 3.1 No Active Datalink -- 3.2 Active Datalink -- 4 Implementation -- 4.1 Active Datalink -- 4.2 No Active Datalink -- 5 Conclusion, Application, and Future Work -- References -- Lethal Autonomous Weapon Systems: An Advocacy Paper -- References -- Measuring the Impact of a Navigation Aid in Unmanned Ship Handling via a Shore Control Center -- 1 Introduction -- 2 Method.
2.1 Missions -- 2.2 Configuration -- 2.3 Participants -- 2.4 Data Processing -- 3 Results -- 4 Conclusion and Future Work -- References -- A Computational Assessment of Ergonomics in an Industrial Human-Robot Collaboration Workplace Using System Dynamics -- 1 Introduction -- 2 Method -- 3 Model -- 3.1 Conceptual Description of the System -- 3.2 Detailed Model -- 4 Simulation and Prospection -- 5 Conclusions and Future Work -- References -- A New Modular Intensive Design Solution for ROVs -- 1 Introduction -- 2 User Research -- 2.1 Observation -- 2.2 Interview -- 3 Design Process -- 3.1 Modular Design Idea -- 3.2 Optimize the Disassembly Structure -- 3.3 Design of Action Module -- 4 Evaluation of Design -- 5 Conclusion -- References -- Drones, Robots and Humanized Behaviors -- Designing for the Unknown: Using Structured Analysis and Design Technique (SADT) to Create a Pilot Domain for a Shore Control Centre for Autonomous Ships -- 1 Introduction -- 2 SADT -- 2.1 Agent-/Artefact Orientated Flowcharts -- 2.2 The Operator -- 3 Case -- 4 Discussion -- 5 Conclusion -- References -- Reporting of Ethical Conduct in Human-Robot Interaction Research -- 1 Introduction -- 2 Method -- 3 Results -- 4 Discussion -- References -- Exploratory Analysis of Research Publications on Robotics in Costa Rica Main Public Universities -- 1 Introduction -- 2 Research Objective -- 3 Background -- 4 Methodology -- 4.1 Selection Criteria -- 5 Findings and Discussion of Results -- 5.1 Distribution of Publications According to year, the Gender of Authorship, University, and Robotic Field -- 5.2 Distribution of Publications According to Gender, Format, Source, and Robotic Field -- 5.3 Distribution of Publications by Type of Robot, Target Audience, and Robotic Role -- 6 Conclusions -- References -- A Century of Humanoid Robotics in Cinema: A Design-Driven Review -- 1 Introduction.
2 Taxonomy -- 3 Selection Criteria -- 4 Visualization -- 5 Findings and Conclusion -- References -- RESPONDRONE - A Multi-UAS Platform to Support Situation Assessment and Decision Making for First Responders -- 1 Introduction -- 2 End-User Requirements -- 2.1 End-User Studies -- 2.2 Design Thinking Workshop -- 3 The RESPONDONE Multi-UAS Platform -- 3.1 Multi-UAS Control and Supervision -- 3.2 User Interface Mock-Ups -- 4 First UI Evaluation -- 4.1 Method -- 4.2 Results -- 5 Discussion -- References -- Robotic Systems for Social Interactions -- Exploring Resilience and Cohesion in Human-Autonomy Teams: Models and Measurement -- 1 Introduction -- 2 Theory: Resilience in Human-Autonomy Teams -- 2.1 Team Cohesion and Resilience -- 2.2 Network and Cyber Resilience -- 2.3 Resilience: Controls Perspective -- 3 Methods -- 3.1 Initial Item Development -- 3.2 Content Validation -- 4 Content Validation Results -- 5 Conclusions and Path Forward -- References -- Multi-modal Emotion Recognition for User Adaptation in Social Robots -- 1 Introduction -- 2 Emotion Detection and Dialog Systems -- 3 Improving Multi Modal Dialog Systems -- 4 Conclusion -- References -- Robot Design Needs Users: A Co-design Approach to HRI -- 1 Scenario -- 2 UX Design Applied to Robotics -- 2.1 Understanding the Social Robot -- 2.2 Understanding the End User -- 3 Co-designing Robots -- 3.1 Stages of the Project -- 3.2 Issues for the Robotic Project -- 4 Good Practices and Challenges for Collaborative Robot Design -- References -- Social Robotic Platform to Strengthen Literacy Skills -- 1 Introduction -- 2 The Robot - Human Interaction -- 3 Design and Implementation -- 3.1 Robotic Platform Structure -- 3.2 Actuators and Controller -- 3.3 Tití App -- 3.4 The Social Interaction -- 4 Conclusions -- References -- Structural Bionic Method of Climbing Robot Based on Video Key Frame Extraction.
1 Introduction -- 2 Theory of Bionic Climbing Robot and Key Frame Extraction -- 2.1 Bionic Climbing Robot -- 2.2 Key Frame Extraction -- 3 Key Frame Images Extraction -- 4 Structure Model Extraction and Transformation -- 5 Conclusion -- References -- Prototype System for Control the ScorBot ER-4U Robotic Arm Using Free Tools -- 1 Introduction -- 2 Hardware -- 2.1 Electronic Control Interface -- 2.2 Electronic Module -- 2.3 Primary Board -- 2.4 Angular Interface -- 3 Software -- 3.1 Communication Interface -- 3.2 Control Firmware -- 3.3 Broker -- 3.4 Control Host -- 4 Experimental Results -- 5 Conclusions -- References -- Human Factors in Cybersecurity -- Detecting Cyberattacks Using Linguistic Analysis -- 1 Introduction -- 2 Levenshtein Distance -- 3 Research Approach -- 4 Reverse Translation -- 5 Comparing Literary Quotes (Q) and Film Dialog (F) -- 6 Comparing the Most and Least Accurate MLD Measures -- 7 Conclusions -- References -- Digital Image Forensics Using Hexadecimal Image Analysis -- 1 Introduction -- 2 Background and Related Work -- 3 Experimental Work -- 4 Results and Comparison -- 5 Conclusion and Future Work -- References -- Identifying Soft Biometric Features from a Combination of Keystroke and Mouse Dynamics -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Mouse Dynamics -- 3.2 Keystroke Dynamics -- 3.3 Machine Learning -- 4 Results -- 4.1 Gender -- 4.2 Handedness -- 4.3 Age -- 4.4 Hours Spent on Electronic Devices -- 4.5 Feature Selection -- 5 Conclusion -- References -- CyberSecurity Privacy Risks -- 1 Introduction -- 2 Privacy -- 3 CyberSecurity Risks -- 4 Privacy Risks -- 4.1 Smart Devices and the Internet of Things (IoT) -- 4.2 Wearables -- 4.3 Social Media -- 4.4 Medical -- 4.5 Financial -- 4.6 Big Data -- 5 Privacy Mitigations -- 5.1 Legal Privacy Protection -- 5.2 Computer and Applications Privacy Settings.
6 Conclusion -- References -- Sharing Photos on Social Media: Visual Attention Affects Real-World Decision Making -- 1 Introduction -- 2 Method -- 2.1 Participants -- 2.2 Procedure -- 2.3 Photo Sharing Task -- 2.4 Personality Measures -- 2.5 Data Acquisition and Processing -- 3 Results -- 3.1 Descriptive Statistics -- 3.2 Correlations -- 3.3 Effects of Looking on Likelihood to Share Memes -- 4 Discussion -- References -- Prosthetic Face Makeups and Detection -- 1 Introduction -- 2 Related Work -- 3 Prosthetic Face Makeup Experiments -- 4 Thermal Signatures -- 5 Near-Infrared Signatures -- 6 Toward Explainable Detection -- 7 Conclusions -- References -- Analysis of Risks to Data Privacy for Family Units in Many Countries -- 1 Introduction -- 2 Selection of Countries for Analysis -- 3 Postal Code Systems -- 4 "Pigeonholes" -- 5 Second Approach -- 6 Family Unit Definition -- 7 Extending to a Global Model -- 8 Conclusions -- References -- Exploring Understanding and Usage of Two-Factor Authentication Account Recovery -- 1 Introduction -- 1.1 User Studies Surrounding 2FA -- 1.2 2FA Account Recovery -- 1.3 Cyber Hygiene: Training and Expertise -- 2 Method -- 2.1 Participants -- 2.2 Materials and Procedure -- 2.3 Knowledge of Authentication -- 3 Results -- 3.1 Demographics and Usage -- 3.2 Overall Authentication Knowledge: Cybersecurity Training and Experience with an Attack -- 4 Discussion -- References -- Strategies of Naive Software Reverse Engineering: A Qualitative Analysis -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch Citizens -- 1 Introduction -- 1.1 The Capability Opportunity Motivation-Behavior Model -- 2 Materials and Method -- 2.1 Sample and Procedure -- 2.2 Measures -- 3 Results.
3.1 Descriptive Statistics and Bivariate Analyses.
Record Nr. UNINA-9910488711503321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial intelligence and blockchain for future cybersecurity applications / / Yassine Maleh [and four others], editors
Artificial intelligence and blockchain for future cybersecurity applications / / Yassine Maleh [and four others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (379 pages)
Disciplina 005.74
Collana Studies in big data
Soggetto topico Blockchains (Databases)
Engineering - Data processing
Cadena de blocs (Bases de dades)
Intel·ligència artificial
Seguretat informàtica
Soggetto genere / forma Llibres electrònics
ISBN 3-030-74575-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483866503321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui