2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (1015 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Engineering - Data processing Cibernètica Seguretat informàtica Protecció de dades |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-79200-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Organization -- General Chairs -- Online Conference Organizing Chairs -- Program Chairs -- Publication Chairs -- Publicity Chairs -- Website and Local Service Chairs -- Program Committee Members -- Welcome Message -- Conference Program at a Glance -- ATCI 2021 Keynotes -- Oral Presentation Instruction -- Registration -- Contents -- Cyber Intelligence for Business and Management Innovations -- Prediction of Total Investment in Fixed Assets Based on the SARIMA Model and X12ARIMA Seasonal Adjustment Method -- 1 Introduction -- 2 Model Establishment and Indicator Description -- 2.1 Data Sources and Related Instruction -- 2.2 Judging Data Seasonality -- 2.3 Model Establishment -- 3 Model Prediction -- 3.1 Analysis and Prediction Using SARIMA Model -- 3.2 X12ARIMA Seasonal Adjustment Method Using Addition -- 3.3 X12ARIMA Seasonal Adjustment Method Using Multiplication -- 3.4 Forecast Results and Comparison of X12ARIMA Seasonal Adjustment Method Using Addition and Multiplication -- 3.5 Automatic Prediction of X12ARIMA Seasonal Adjustment Method Based on R Language -- 4 Conclusion -- References -- Analysis of the Impact of Green Credit on the Operating Efficiency of Listed Commercial Banks Based on Python -- 1 Introduction -- 2 Data and Model -- 2.1 Variable Selection -- 2.2 Data Source -- 2.3 Descriptive Statistical Analysis -- 2.4 Model Setting and Selection -- 2.5 Model Selection -- 3 Conclusions -- References -- The Influence of Computer Network Technology on Trade Development -- 1 Changes of Trade Market Environment under the Background of Internet Development -- 2 Application of Internet Technology in Trade Activities -- 3 The Impact of Internet on the Development of Trade -- 4 Problems in the Application of Internet in Trade -- 5 Improve the Effectiveness of Internet Application in Trade Process -- 6 Conclusion -- References.
The Application of Knowledge Map and the Construction of Enterprise Knowledge Map -- 1 Introduction -- 2 Knowledge Graph and Structure of the Enterprise Information System -- 3 Application of Knowledge Graph -- 3.1 Problem Solving -- 3.2 Network Security -- 3.3 Intelligent Application -- 4 Construction of Knowledge Map -- 4.1 Knowledge Extraction -- 4.2 Knowledge Integration -- 4.3 Developing Knowledge Map -- 5 Conclusion -- References -- Interaction Mechanism of Regional Tourism Industry and Information Industry -- 1 Introduction -- 2 Research Methods -- 3 Evaluation System -- 4 Interaction Mechanism -- 4.1 Stationarity Test -- 4.2 Selection of Lag Order -- 4.3 PVR Model Estimation -- 4.4 The Dynamic Response of Tourism Industry and Information Industry -- 4.5 Analysis of Variance -- 5 Conclusion -- References -- Service Quality Evaluation of Office Property Management Based on SERVQUAL Model -- 1 Introduction -- 2 Related theories of Office Property Management Service Quality -- 3 Establishment of Service Quality Index System -- 3.1 Index Selection -- 3.2 Weight Determination -- 3.3 The Square Root Method is Used to Calculate the Eigenvector and Weight -- 3.4 Evaluate the Service Quality of Office Property Management -- 4 Service Quality Satisfaction and Importance Evaluation -- 5 Conclusions -- References -- Characteristics and Trends of Tourism Informatization Research - Based on Citespace Knowledge Map Analysis -- 1 Introduction -- 2 Research Methods and Data Sources -- 3 Statistics and Analysis -- 3.1 Distribution of Domestic Tourism Information Research -- 3.2 Distribution of Domestic Tourism Information Research Journals -- 3.3 An Analysis of the Frontier Hot Spots of Domestic Tourism Informatization Research -- 3.4 Trajectory and Trend Analysis of Domestic Tourism Informatization Research -- 4 Discussion and Conclusion -- References. Policy Guarantee for the Development of FinTech Under the Flow of Information Technology in Guangdong-Hong Kong-Macao Greater Bay Area -- 1 Introduction -- 2 Challenges Facing FinTech Development in the Greater Bay Area -- 2.1 The Flow of FinTech Talents is Not Smooth -- 2.2 Cross-Border Logistics Transportation is Not Smooth -- 2.3 The Cross-Border Use of Financial Funds is Not Smooth -- 2.4 The Communication of Information and Data is Not Smooth -- 3 Policy Guarantee for the Development of FinTech in the Greater Bay Area -- 3.1 Administrative Management and Policy Guarantee -- 3.2 Talent Guarantee for the Development of Dawan FinTech -- 3.3 Healthy Competition Guarantee for the Development of Insurance Technology in the Greater Bay Area -- 3.4 Platform Guarantee for FinTech in the Greater Bay Area -- 3.5 Risk Prevention of FinTech in the Greater Bay Area -- 4 Conclusion -- References -- Training Mode of Applied Talents in Tourism Management Specialty Under Artificial Intelligence -- 1 Introduction -- 2 Relevant Concepts -- 2.1 AI Concept -- 2.2 Applied Talents of Tourism Major -- 2.3 Talent Training Mode -- 2.4 Basic Algorithm -- 3 Practical Research on the Talent Training Mode of Tourism Management Major from the Perspective of AI -- 3.1 Subjects -- 3.2 Experimental Steps -- 4 Statistical Analysis of Data -- 4.1 Students' Understanding of AI in Teaching -- 4.2 Students' Experience Based on AI -- 4.3 Assessment Result Analysis -- 5 Conclusion -- References -- Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance -- 1 Research on the Background of Cross-Border E-commerce Payment in China -- 1.1 Traditional Payment Cross-Border E-commerce Platform -- 1.2 Third-Party Payment Cross-Border E-commerce Platform -- 2 Internet Finance Promotes Cross-Border Electronic Payment. 3 Existing Problems and Risk Analysis of Cross-Border E-commerce Payment -- 3.1 Credit System Defects and Payment Credit Risk -- 3.2 Regulatory Risks of Big Data and User Privacy -- 3.3 Risk of Cross-Border Money Laundering and Illegal Flow of Funds -- 3.4 Legal Risks of Cross-Border Electronic Payment -- 4 Strategic Analysis and Development Research of Cross-Border Electronic Payment Industry -- 4.1 Strengthen the Supervision of Cross-Border Electronic Commerce Payment -- 4.2 Improve the Security of Third-Party Payment Information in the Era of Big Data -- 4.3 Improve the Credit Information Work and Establish an Online and Offline Credit Information System -- 4.4 Improve the Access System for Third-Party Cross-Border Payment Services -- 4.5 Attach Importance to and Strengthen Anti-money Laundering Work -- References -- The Construction and Application of Financial Sharing Service Center of Enterprise Group -- 1 The Strategic Significance of Building Financial Sharing Service Center to Strengthen Financial Control of Enterprise Groups -- 2 Principles and Key Points of Financial Sharing Service Center Construction -- 3 Core Systems and System Integration of Financial Shared Service Center Construction -- 4 Management and Control Mode and Expected Effect of Financial Shared Service Center -- 5 Financial Sharing Service Center Construction Risk and Countermeasures -- References -- Analysis on Employment Situation of Applied Universities in Transformation and Development -- 1 Introduction -- 2 Main Factors Affecting the Employment Rate of Colleges and Universities -- 2.1 The Increase of College Enrollment Leads to the Decrease of the Gold Content -- 2.2 The Leading Role of University Education is Challenged by the Development of Internet -- 2.3 The Speed of Knowledge Renewal in Colleges and Universities Lags Behind the Development of Industry. 2.4 The Motive Force for Colleges and Universities to Seek Employment Growth Point is Not Strong -- 2.5 Higher-Educated People are More Attractive to Businesses than Students -- 2.6 The Orientation of Employment of College Students is Not Accurate -- 3 Analysis of Employment Data of Jilin Agricultural Science and Technology Institute -- 4 Exploration of the Work Model Which is Favorable to the Comprehensive Quality Improvement of Employment -- 4.1 Accurate Positioning -- 4.2 Graded Advance -- 4.3 Ideological Guidance -- 4.4 Comprehensive Plan -- 5 Summary and Outlook -- References -- Corpus-Based Comparative Study on Chinese and English Subjectivity -- 1 Introduction -- 1.1 Problem and Research Question -- 1.2 Review of Literature -- 2 Research Methods -- 2.1 The Corpus and Data -- 2.2 Data Collection and Analysis -- 2.3 Results -- 3 Discussion -- 4 Conclusion -- References -- Analysis on the Development of Regional Innovation Ability Driven by Internet Under the Background of "Internet Plus" -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Cost Effect -- 2.2 Competitive Effect -- 2.3 Spillover Effect -- 3 Analysis of Existing Circumstance -- 4 Conclusion and Enlightenment -- References -- Influence Mechanism of Mobile Social Network Users' Product Recommendation Information on Consumers' Intention to Participate Sharing Economy -- 1 Introduction -- 2 Theoretical Bases -- 2.1 Theory of Planned Behavior -- 2.2 Source Credibility Theory -- 3 Influencing Mechanism Analysis -- 3.1 Influencing Mechanism of TPB Factors -- 3.2 Influence Mechanism of Source Credibility Factors -- 3.3 The Theoretical Model -- 4 Management Implication -- 4.1 Improve Consumers' Perception of Source Credibility -- 4.2 Improve Consumers' Perceived Ease-of-Use to Mobile Social Network Apps -- 5 Conclusions -- References -- Optimizing System Management Based on Trust of Domain. 1 Account Management Issues. |
Record Nr. | UNINA-9910488718803321 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced computing and systems for security . Volume 14 / / Rituparna Chaki [and four others], editors |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (213 pages) |
Disciplina | 005.8 |
Collana | Lecture notes in networks and systems |
Soggetto topico |
Computer security
Seguretat informàtica Models matemàtics Mineria de dades Algorismes computacionals |
Soggetto genere / forma |
Llibres electrònics
Congressos |
ISBN | 981-16-4294-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910734097103321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advancements in Interdisciplinary Research : First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers / / edited by Vijayan Sugumaran, Divya Upadhyay, Shanu Sharma |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (562 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Image processing—Digital techniques Computer vision Computer engineering Computer networks Social sciences—Data processing Application software Software engineering Artificial Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Computer and Information Systems Applications Software Engineering Intel·ligència artificial Seguretat informàtica Internet de les coses |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-031-23724-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Novel Technologies enabled Secured Privacy Models and Optimized Networking Infrastructures toward Secure Industries -- Developments towards Sustainable Healthcare Sector -- Machine Learning and Deep Learning Enabled Applications in Different Sectors -- Robotics and Computer Vision for Intelligent Automation in Industries -- Trending Technologies: Frameworks and Applications focusing Real Life Issues. |
Record Nr. | UNINA-9910645893403321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (730 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Artificial intelligence Image processing - Digital techniques Computer vision Education - Data processing Social sciences - Data processing Computer networks Data and Information Security Artificial Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Computers and Education Computer Application in Social and Behavioral Sciences Computer Communication Networks Intel·ligència artificial Seguretat informàtica |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-031-06767-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910584597303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (732 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Computer engineering Computer networks Artificial intelligence Image processing - Digital techniques Computer vision Data and Information Security Computer Engineering and Networks Computer Communication Networks Artificial Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Intel·ligència artificial Seguretat informàtica |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-031-06761-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence -- Big Data -- Cloud Computing and Security -- Multimedia Forensics. |
Record Nr. | UNINA-9910584493803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (760 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Image processing - Digital techniques Computer vision Social sciences - Data processing Education - Data processing Data and Information Security Machine Learning Computer Engineering and Networks Computer Imaging, Vision, Pattern Recognition and Graphics Computer Application in Social and Behavioral Sciences Computers and Education Intel·ligència artificial Seguretat informàtica Computació en núvol |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-78615-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese. |
Record Nr. | UNISA-996464519403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I / / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (760 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Image processing - Digital techniques Computer vision Social sciences - Data processing Education - Data processing Data and Information Security Machine Learning Computer Engineering and Networks Computer Imaging, Vision, Pattern Recognition and Graphics Computer Application in Social and Behavioral Sciences Computers and Education Intel·ligència artificial Seguretat informàtica Computació en núvol |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-78615-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Artificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese. |
Record Nr. | UNINA-9910488693903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Biometric Person Authentication [[electronic resource] ] : 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings / / edited by Stan Z. Li, Jianhuang Lai, Tieniu Tan, Guocan Feng, Yunhong Wang |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XVIII, 700 p.) |
Disciplina | 006.4 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Pattern recognition
Application software Multimedia information systems Special purpose computers Management information systems Computer science Pattern Recognition Computer Appl. in Social and Behavioral Sciences Computer Appl. in Administrative Data Processing Multimedia Information Systems Special Purpose and Application-Based Systems Management of Computing and Information Systems Seguretat informàtica Reconeixement de formes (Informàtica) Biometria |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-540-30548-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Biometrics -- Biometrics: When Identity Matters -- Face Recognition: Technical Challenges and Research Directions -- Fingerprints: Recognition, Performance Evaluation and Synthetic Generation -- Recognising Persons by Their Iris Patterns -- Multiple Classifier Fusion for Biometric Authentication -- Performance Evaluation in 1 : 1 Biometric Engines -- Best Performing Biometric Engines -- Discussions on Some Problems in Face Recognition -- Improving Fingerprint Recognition Performance Based on Feature Fusion and Adaptive Registration Pattern -- Iris Recognition Based on Non-local Comparisons -- Palmprint Authentication Technologies, Systems and Applications -- Face Recognition -- Novel Face Detection Method Based on Gabor Features -- Optimal Shape Space and Searching in ASM Based Face Alignment -- Gabor Wavelet-Based Eyes and Mouth Detection Algorithm -- An Entropy-Based Diversity Measure for Classifier Combining and Its Application to Face Classifier Ensemble Thinning -- Estimating the Visual Direction with Two-Circle Algorithm -- Multiple Face Contour Detection Using Adaptive Flows -- Pose Normalization Using Generic 3D Face Model as a Priori for Pose-Insensitive Face Recognition -- Gabor-Based Kernel Fisher Discriminant Analysis for Pose Discrimination -- Robust Pose Estimation of Face Using Genetic Algorithm -- Facial Pose Estimation Based on the Mongolian Race’s Feature Characteristic from a Monocular Image -- Boosting Local Binary Pattern (LBP)-Based Face Recognition -- Gabor Features Based Method Using HDR (G-HDR) for Multiview Face Recognition -- Face Recognition Under Varying Lighting Based on Derivates of Log Image -- A Fast Method of Lighting Estimate Using Multi-linear Algebra -- Face Recognition Using More than One Still Image: What Is More? -- Video-Based Face Recognition Using a Metric of Average Euclidean Distance -- 3D Face Recognition Based on G-H Shape Variation -- 3D Face Recognition Based on Geometrical Measurement -- 3D Face Recognition Using Eigen-Spectrum on the Flattened Facial Surface -- Building a 3D Morphable Face Model by Using Thin Plate Splines for Face Reconstruction -- 3D Surface Reconstruction Based on One Non-symmetric Face Image -- Recent Advances in Subspace Analysis for Face Recognition -- Component-Based Cascade Linear Discriminant Analysis for Face Recognition -- Unified Locally Linear Embedding and Linear Discriminant Analysis Algorithm (ULLELDA) for Face Recognition -- On Dimensionality Reduction for Client Specific Discriminant Analysis with Application to Face Verification -- The Solution Space for Fisher Discriminant Analysis and the Uniqueness Under Constraints -- A Novel One-Parameter Regularized Linear Discriminant Analysis for Solving Small Sample Size Problem in Face Recognition -- Fast Calculation for Fisher Criteria in Small Sample Size Problem -- Vision-Based Face Understanding Technologies and Their Applications -- International Standardization on Face Recognition Technology -- System Design and Assessment Methodology for Face Recognition Algorithms -- Baseline Evaluations on the CAS-PEAL-R1 Face Database -- An Efficient Compression and Reconstruction Method of Face Image for Low Rate Net -- How Can We Reconstruct Facial Image from Partially Occluded or Low-Resolution One? -- A Matrix-Oriented Method for Appearance-Based Data Compression – An Idea from Group Representation Theory -- Fingerprint Recognition -- An Adaptive Fingerprint Post-processing Algorithm Based on Mathematical Morphology -- Fingerprint Image Segmentation by Energy of Gaussian-Hermite Moments -- Robust Ridge Following in Fingerprints -- A New Approach for Fingerprint Minutiae Extraction -- A Top-Down Fingerprint Image Enhancement Method Based on Fourier Analysis -- Fingerprint Templates Combination -- Skeletonization of Fingerprint Based-on Modulus Minima of Wavelet Transform -- Transformation-Variants Estimation Using Similarity Relative Histogram Grouping Model -- A Study of Minutiae Matching Algorithm Based on Orientation Validation -- Cascading a Couple of Registration Methods for a High Accurate Fingerprint Verification System -- A Hierarchical Fingerprint Matching Method Based on Rotation Invariant Features -- Phase-Correlation Based Registration of Swipe Fingerprints -- An Improved Method for Singularity Detection of Fingerprint Images -- Fingerprint Classifier Using Embedded Hidden Markov Models -- A Robust Pseudoridges Extraction Algorithm for Fingerprints -- Iris Recognition -- Iris Image Capture System Design for Personal Identification -- An Iris Segmentation Procedure for Iris Recognition -- Zernike Moment Invariants Based Iris Recognition -- Two-Dimensional Projection and Crossing for Iris Optimal Localization -- Speaker Recognition -- Improvement of Speaker Identification by Combining Prosodic Features with Acoustic Features -- Bimodal Speaker Identification Using Dynamic Bayesian Network -- A Novel Pitch Period Detection Algorithm Based on Hilbert-Huang Transform -- Noisy Speech Pitch Detection Based on Mathematical Morphology and Weighted MACF -- Glottal Information Based Spectral Recuperation in Multi-channel Speaker Recognition -- Speaker Modeling Technique Based on Regression Class for Speaker Identification with Sparse Training -- Other Biometrics -- Some Issues Pertaining to Adaptive Multimodal Biometric Authentication -- Protecting Biometric Data for Personal Identification -- Digital Curvelet Transform for Palmprint Recognition -- On-line Writer Verification Using Force Features of Basic Strokes -- A Novel Force Sensitive Tablet for Handwriting Information Acquisition -- Shape and Structural Feature Based Ear Recognition -- LLE Based Gait Analysis and Recognition -- Personal Identification Using Knuckleprint -- AAM Based Matching of Hand Appearance for User Verification. |
Record Nr. | UNISA-996466360203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNINA-9910502594403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (268 pages) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-88381-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
Record Nr. | UNISA-996464525303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|