top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (1015 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Cibernètica
Seguretat informàtica
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-79200-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Organization -- General Chairs -- Online Conference Organizing Chairs -- Program Chairs -- Publication Chairs -- Publicity Chairs -- Website and Local Service Chairs -- Program Committee Members -- Welcome Message -- Conference Program at a Glance -- ATCI 2021 Keynotes -- Oral Presentation Instruction -- Registration -- Contents -- Cyber Intelligence for Business and Management Innovations -- Prediction of Total Investment in Fixed Assets Based on the SARIMA Model and X12ARIMA Seasonal Adjustment Method -- 1 Introduction -- 2 Model Establishment and Indicator Description -- 2.1 Data Sources and Related Instruction -- 2.2 Judging Data Seasonality -- 2.3 Model Establishment -- 3 Model Prediction -- 3.1 Analysis and Prediction Using SARIMA Model -- 3.2 X12ARIMA Seasonal Adjustment Method Using Addition -- 3.3 X12ARIMA Seasonal Adjustment Method Using Multiplication -- 3.4 Forecast Results and Comparison of X12ARIMA Seasonal Adjustment Method Using Addition and Multiplication -- 3.5 Automatic Prediction of X12ARIMA Seasonal Adjustment Method Based on R Language -- 4 Conclusion -- References -- Analysis of the Impact of Green Credit on the Operating Efficiency of Listed Commercial Banks Based on Python -- 1 Introduction -- 2 Data and Model -- 2.1 Variable Selection -- 2.2 Data Source -- 2.3 Descriptive Statistical Analysis -- 2.4 Model Setting and Selection -- 2.5 Model Selection -- 3 Conclusions -- References -- The Influence of Computer Network Technology on Trade Development -- 1 Changes of Trade Market Environment under the Background of Internet Development -- 2 Application of Internet Technology in Trade Activities -- 3 The Impact of Internet on the Development of Trade -- 4 Problems in the Application of Internet in Trade -- 5 Improve the Effectiveness of Internet Application in Trade Process -- 6 Conclusion -- References.
The Application of Knowledge Map and the Construction of Enterprise Knowledge Map -- 1 Introduction -- 2 Knowledge Graph and Structure of the Enterprise Information System -- 3 Application of Knowledge Graph -- 3.1 Problem Solving -- 3.2 Network Security -- 3.3 Intelligent Application -- 4 Construction of Knowledge Map -- 4.1 Knowledge Extraction -- 4.2 Knowledge Integration -- 4.3 Developing Knowledge Map -- 5 Conclusion -- References -- Interaction Mechanism of Regional Tourism Industry and Information Industry -- 1 Introduction -- 2 Research Methods -- 3 Evaluation System -- 4 Interaction Mechanism -- 4.1 Stationarity Test -- 4.2 Selection of Lag Order -- 4.3 PVR Model Estimation -- 4.4 The Dynamic Response of Tourism Industry and Information Industry -- 4.5 Analysis of Variance -- 5 Conclusion -- References -- Service Quality Evaluation of Office Property Management Based on SERVQUAL Model -- 1 Introduction -- 2 Related theories of Office Property Management Service Quality -- 3 Establishment of Service Quality Index System -- 3.1 Index Selection -- 3.2 Weight Determination -- 3.3 The Square Root Method is Used to Calculate the Eigenvector and Weight -- 3.4 Evaluate the Service Quality of Office Property Management -- 4 Service Quality Satisfaction and Importance Evaluation -- 5 Conclusions -- References -- Characteristics and Trends of Tourism Informatization Research - Based on Citespace Knowledge Map Analysis -- 1 Introduction -- 2 Research Methods and Data Sources -- 3 Statistics and Analysis -- 3.1 Distribution of Domestic Tourism Information Research -- 3.2 Distribution of Domestic Tourism Information Research Journals -- 3.3 An Analysis of the Frontier Hot Spots of Domestic Tourism Informatization Research -- 3.4 Trajectory and Trend Analysis of Domestic Tourism Informatization Research -- 4 Discussion and Conclusion -- References.
Policy Guarantee for the Development of FinTech Under the Flow of Information Technology in Guangdong-Hong Kong-Macao Greater Bay Area -- 1 Introduction -- 2 Challenges Facing FinTech Development in the Greater Bay Area -- 2.1 The Flow of FinTech Talents is Not Smooth -- 2.2 Cross-Border Logistics Transportation is Not Smooth -- 2.3 The Cross-Border Use of Financial Funds is Not Smooth -- 2.4 The Communication of Information and Data is Not Smooth -- 3 Policy Guarantee for the Development of FinTech in the Greater Bay Area -- 3.1 Administrative Management and Policy Guarantee -- 3.2 Talent Guarantee for the Development of Dawan FinTech -- 3.3 Healthy Competition Guarantee for the Development of Insurance Technology in the Greater Bay Area -- 3.4 Platform Guarantee for FinTech in the Greater Bay Area -- 3.5 Risk Prevention of FinTech in the Greater Bay Area -- 4 Conclusion -- References -- Training Mode of Applied Talents in Tourism Management Specialty Under Artificial Intelligence -- 1 Introduction -- 2 Relevant Concepts -- 2.1 AI Concept -- 2.2 Applied Talents of Tourism Major -- 2.3 Talent Training Mode -- 2.4 Basic Algorithm -- 3 Practical Research on the Talent Training Mode of Tourism Management Major from the Perspective of AI -- 3.1 Subjects -- 3.2 Experimental Steps -- 4 Statistical Analysis of Data -- 4.1 Students' Understanding of AI in Teaching -- 4.2 Students' Experience Based on AI -- 4.3 Assessment Result Analysis -- 5 Conclusion -- References -- Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance -- 1 Research on the Background of Cross-Border E-commerce Payment in China -- 1.1 Traditional Payment Cross-Border E-commerce Platform -- 1.2 Third-Party Payment Cross-Border E-commerce Platform -- 2 Internet Finance Promotes Cross-Border Electronic Payment.
3 Existing Problems and Risk Analysis of Cross-Border E-commerce Payment -- 3.1 Credit System Defects and Payment Credit Risk -- 3.2 Regulatory Risks of Big Data and User Privacy -- 3.3 Risk of Cross-Border Money Laundering and Illegal Flow of Funds -- 3.4 Legal Risks of Cross-Border Electronic Payment -- 4 Strategic Analysis and Development Research of Cross-Border Electronic Payment Industry -- 4.1 Strengthen the Supervision of Cross-Border Electronic Commerce Payment -- 4.2 Improve the Security of Third-Party Payment Information in the Era of Big Data -- 4.3 Improve the Credit Information Work and Establish an Online and Offline Credit Information System -- 4.4 Improve the Access System for Third-Party Cross-Border Payment Services -- 4.5 Attach Importance to and Strengthen Anti-money Laundering Work -- References -- The Construction and Application of Financial Sharing Service Center of Enterprise Group -- 1 The Strategic Significance of Building Financial Sharing Service Center to Strengthen Financial Control of Enterprise Groups -- 2 Principles and Key Points of Financial Sharing Service Center Construction -- 3 Core Systems and System Integration of Financial Shared Service Center Construction -- 4 Management and Control Mode and Expected Effect of Financial Shared Service Center -- 5 Financial Sharing Service Center Construction Risk and Countermeasures -- References -- Analysis on Employment Situation of Applied Universities in Transformation and Development -- 1 Introduction -- 2 Main Factors Affecting the Employment Rate of Colleges and Universities -- 2.1 The Increase of College Enrollment Leads to the Decrease of the Gold Content -- 2.2 The Leading Role of University Education is Challenged by the Development of Internet -- 2.3 The Speed of Knowledge Renewal in Colleges and Universities Lags Behind the Development of Industry.
2.4 The Motive Force for Colleges and Universities to Seek Employment Growth Point is Not Strong -- 2.5 Higher-Educated People are More Attractive to Businesses than Students -- 2.6 The Orientation of Employment of College Students is Not Accurate -- 3 Analysis of Employment Data of Jilin Agricultural Science and Technology Institute -- 4 Exploration of the Work Model Which is Favorable to the Comprehensive Quality Improvement of Employment -- 4.1 Accurate Positioning -- 4.2 Graded Advance -- 4.3 Ideological Guidance -- 4.4 Comprehensive Plan -- 5 Summary and Outlook -- References -- Corpus-Based Comparative Study on Chinese and English Subjectivity -- 1 Introduction -- 1.1 Problem and Research Question -- 1.2 Review of Literature -- 2 Research Methods -- 2.1 The Corpus and Data -- 2.2 Data Collection and Analysis -- 2.3 Results -- 3 Discussion -- 4 Conclusion -- References -- Analysis on the Development of Regional Innovation Ability Driven by Internet Under the Background of "Internet Plus" -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Cost Effect -- 2.2 Competitive Effect -- 2.3 Spillover Effect -- 3 Analysis of Existing Circumstance -- 4 Conclusion and Enlightenment -- References -- Influence Mechanism of Mobile Social Network Users' Product Recommendation Information on Consumers' Intention to Participate Sharing Economy -- 1 Introduction -- 2 Theoretical Bases -- 2.1 Theory of Planned Behavior -- 2.2 Source Credibility Theory -- 3 Influencing Mechanism Analysis -- 3.1 Influencing Mechanism of TPB Factors -- 3.2 Influence Mechanism of Source Credibility Factors -- 3.3 The Theoretical Model -- 4 Management Implication -- 4.1 Improve Consumers' Perception of Source Credibility -- 4.2 Improve Consumers' Perceived Ease-of-Use to Mobile Social Network Apps -- 5 Conclusions -- References -- Optimizing System Management Based on Trust of Domain.
1 Account Management Issues.
Record Nr. UNINA-9910488718803321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced computing and systems for security . Volume 14 / / Rituparna Chaki [and four others], editors
Advanced computing and systems for security . Volume 14 / / Rituparna Chaki [and four others], editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (213 pages)
Disciplina 005.8
Collana Lecture notes in networks and systems
Soggetto topico Computer security
Seguretat informàtica
Models matemàtics
Mineria de dades
Algorismes computacionals
Soggetto genere / forma Llibres electrònics
Congressos
ISBN 981-16-4294-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910734097103321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advancements in Interdisciplinary Research : First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers / / edited by Vijayan Sugumaran, Divya Upadhyay, Shanu Sharma
Advancements in Interdisciplinary Research : First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers / / edited by Vijayan Sugumaran, Divya Upadhyay, Shanu Sharma
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (562 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Image processing—Digital techniques
Computer vision
Computer engineering
Computer networks
Social sciences—Data processing
Application software
Software engineering
Artificial Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Engineering and Networks
Computer Application in Social and Behavioral Sciences
Computer and Information Systems Applications
Software Engineering
Intel·ligència artificial
Seguretat informàtica
Internet de les coses
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-23724-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Novel Technologies enabled Secured Privacy Models and Optimized Networking Infrastructures toward Secure Industries -- Developments towards Sustainable Healthcare Sector -- Machine Learning and Deep Learning Enabled Applications in Different Sectors -- Robotics and Computer Vision for Intelligent Automation in Industries -- Trending Technologies: Frameworks and Applications focusing Real Life Issues.
Record Nr. UNINA-9910645893403321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (730 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Artificial intelligence
Image processing - Digital techniques
Computer vision
Education - Data processing
Social sciences - Data processing
Computer networks
Data and Information Security
Artificial Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Computers and Education
Computer Application in Social and Behavioral Sciences
Computer Communication Networks
Intel·ligència artificial
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-06767-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910584597303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (732 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computer engineering
Computer networks
Artificial intelligence
Image processing - Digital techniques
Computer vision
Data and Information Security
Computer Engineering and Networks
Computer Communication Networks
Artificial Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Intel·ligència artificial
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-06761-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- Big Data -- Cloud Computing and Security -- Multimedia Forensics.
Record Nr. UNINA-9910584493803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNISA-996464519403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (760 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Image processing - Digital techniques
Computer vision
Social sciences - Data processing
Education - Data processing
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Imaging, Vision, Pattern Recognition and Graphics
Computer Application in Social and Behavioral Sciences
Computers and Education
Intel·ligència artificial
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-78615-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese.
Record Nr. UNINA-9910488693903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Biometric Person Authentication [[electronic resource] ] : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings / / edited by Stan Z. Li, Jianhuang Lai, Tieniu Tan, Guocan Feng, Yunhong Wang
Advances in Biometric Person Authentication [[electronic resource] ] : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings / / edited by Stan Z. Li, Jianhuang Lai, Tieniu Tan, Guocan Feng, Yunhong Wang
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XVIII, 700 p.)
Disciplina 006.4
Collana Lecture Notes in Computer Science
Soggetto topico Pattern recognition
Application software
Multimedia information systems
Special purpose computers
Management information systems
Computer science
Pattern Recognition
Computer Appl. in Social and Behavioral Sciences
Computer Appl. in Administrative Data Processing
Multimedia Information Systems
Special Purpose and Application-Based Systems
Management of Computing and Information Systems
Seguretat informàtica
Reconeixement de formes (Informàtica)
Biometria
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-540-30548-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Biometrics -- Biometrics: When Identity Matters -- Face Recognition: Technical Challenges and Research Directions -- Fingerprints: Recognition, Performance Evaluation and Synthetic Generation -- Recognising Persons by Their Iris Patterns -- Multiple Classifier Fusion for Biometric Authentication -- Performance Evaluation in 1 : 1 Biometric Engines -- Best Performing Biometric Engines -- Discussions on Some Problems in Face Recognition -- Improving Fingerprint Recognition Performance Based on Feature Fusion and Adaptive Registration Pattern -- Iris Recognition Based on Non-local Comparisons -- Palmprint Authentication Technologies, Systems and Applications -- Face Recognition -- Novel Face Detection Method Based on Gabor Features -- Optimal Shape Space and Searching in ASM Based Face Alignment -- Gabor Wavelet-Based Eyes and Mouth Detection Algorithm -- An Entropy-Based Diversity Measure for Classifier Combining and Its Application to Face Classifier Ensemble Thinning -- Estimating the Visual Direction with Two-Circle Algorithm -- Multiple Face Contour Detection Using Adaptive Flows -- Pose Normalization Using Generic 3D Face Model as a Priori for Pose-Insensitive Face Recognition -- Gabor-Based Kernel Fisher Discriminant Analysis for Pose Discrimination -- Robust Pose Estimation of Face Using Genetic Algorithm -- Facial Pose Estimation Based on the Mongolian Race’s Feature Characteristic from a Monocular Image -- Boosting Local Binary Pattern (LBP)-Based Face Recognition -- Gabor Features Based Method Using HDR (G-HDR) for Multiview Face Recognition -- Face Recognition Under Varying Lighting Based on Derivates of Log Image -- A Fast Method of Lighting Estimate Using Multi-linear Algebra -- Face Recognition Using More than One Still Image: What Is More? -- Video-Based Face Recognition Using a Metric of Average Euclidean Distance -- 3D Face Recognition Based on G-H Shape Variation -- 3D Face Recognition Based on Geometrical Measurement -- 3D Face Recognition Using Eigen-Spectrum on the Flattened Facial Surface -- Building a 3D Morphable Face Model by Using Thin Plate Splines for Face Reconstruction -- 3D Surface Reconstruction Based on One Non-symmetric Face Image -- Recent Advances in Subspace Analysis for Face Recognition -- Component-Based Cascade Linear Discriminant Analysis for Face Recognition -- Unified Locally Linear Embedding and Linear Discriminant Analysis Algorithm (ULLELDA) for Face Recognition -- On Dimensionality Reduction for Client Specific Discriminant Analysis with Application to Face Verification -- The Solution Space for Fisher Discriminant Analysis and the Uniqueness Under Constraints -- A Novel One-Parameter Regularized Linear Discriminant Analysis for Solving Small Sample Size Problem in Face Recognition -- Fast Calculation for Fisher Criteria in Small Sample Size Problem -- Vision-Based Face Understanding Technologies and Their Applications -- International Standardization on Face Recognition Technology -- System Design and Assessment Methodology for Face Recognition Algorithms -- Baseline Evaluations on the CAS-PEAL-R1 Face Database -- An Efficient Compression and Reconstruction Method of Face Image for Low Rate Net -- How Can We Reconstruct Facial Image from Partially Occluded or Low-Resolution One? -- A Matrix-Oriented Method for Appearance-Based Data Compression – An Idea from Group Representation Theory -- Fingerprint Recognition -- An Adaptive Fingerprint Post-processing Algorithm Based on Mathematical Morphology -- Fingerprint Image Segmentation by Energy of Gaussian-Hermite Moments -- Robust Ridge Following in Fingerprints -- A New Approach for Fingerprint Minutiae Extraction -- A Top-Down Fingerprint Image Enhancement Method Based on Fourier Analysis -- Fingerprint Templates Combination -- Skeletonization of Fingerprint Based-on Modulus Minima of Wavelet Transform -- Transformation-Variants Estimation Using Similarity Relative Histogram Grouping Model -- A Study of Minutiae Matching Algorithm Based on Orientation Validation -- Cascading a Couple of Registration Methods for a High Accurate Fingerprint Verification System -- A Hierarchical Fingerprint Matching Method Based on Rotation Invariant Features -- Phase-Correlation Based Registration of Swipe Fingerprints -- An Improved Method for Singularity Detection of Fingerprint Images -- Fingerprint Classifier Using Embedded Hidden Markov Models -- A Robust Pseudoridges Extraction Algorithm for Fingerprints -- Iris Recognition -- Iris Image Capture System Design for Personal Identification -- An Iris Segmentation Procedure for Iris Recognition -- Zernike Moment Invariants Based Iris Recognition -- Two-Dimensional Projection and Crossing for Iris Optimal Localization -- Speaker Recognition -- Improvement of Speaker Identification by Combining Prosodic Features with Acoustic Features -- Bimodal Speaker Identification Using Dynamic Bayesian Network -- A Novel Pitch Period Detection Algorithm Based on Hilbert-Huang Transform -- Noisy Speech Pitch Detection Based on Mathematical Morphology and Weighted MACF -- Glottal Information Based Spectral Recuperation in Multi-channel Speaker Recognition -- Speaker Modeling Technique Based on Regression Class for Speaker Identification with Sparse Training -- Other Biometrics -- Some Issues Pertaining to Adaptive Multimodal Biometric Authentication -- Protecting Biometric Data for Personal Identification -- Digital Curvelet Transform for Palmprint Recognition -- On-line Writer Verification Using Force Features of Basic Strokes -- A Novel Force Sensitive Tablet for Handwriting Information Acquisition -- Shape and Structural Feature Based Ear Recognition -- LLE Based Gait Analysis and Recognition -- Personal Identification Using Knuckleprint -- AAM Based Matching of Hand Appearance for User Verification.
Record Nr. UNISA-996466360203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNINA-9910502594403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Machine learning
Computer engineering
Computer networks
Computers - Law and legislation
Information technology - Law and legislation
Data and Information Security
Machine Learning
Computer Engineering and Networks
Computer Communication Networks
Legal Aspects of Computing
Medicina legal
Xifratge (Informàtica)
Seguretat informàtica
Programari d'aplicació
Cibercultura
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-88381-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism.
4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS.
Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References.
Record Nr. UNISA-996464525303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui