Information Security and Privacy
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15¿17, 2024, Proceedings, Part III
Herausgegeben:Zhu, Tianqing; Li, Yannan
Information Security and Privacy
29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15¿17, 2024, Proceedings, Part III
Herausgegeben:Zhu, Tianqing; Li, Yannan
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security.
Andere Kunden interessierten sich auch für
- Information Security and Privacy55,99 €
- Information Security and Privacy55,99 €
- Applications and Techniques in Information Security48,99 €
- Science of Cyber Security - SciSec 2022 Workshops55,99 €
- Applications and Techniques in Information Security55,99 €
- Security and Privacy in Social Networks and Big Data37,99 €
- Big Data and Security88,99 €
-
-
-
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15-17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 14897
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-5100-6
- 2024
- Seitenzahl: 480
- Erscheinungstermin: 15. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 26mm
- Gewicht: 721g
- ISBN-13: 9789819751006
- ISBN-10: 9819751004
- Artikelnr.: 70921547
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
- Lecture Notes in Computer Science 14897
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-97-5100-6
- 2024
- Seitenzahl: 480
- Erscheinungstermin: 15. Juli 2024
- Englisch
- Abmessung: 235mm x 155mm x 26mm
- Gewicht: 721g
- ISBN-13: 9789819751006
- ISBN-10: 9819751004
- Artikelnr.: 70921547
- Herstellerkennzeichnung
- Books on Demand GmbH
- In de Tarpen 42
- 22848 Norderstedt
- info@bod.de
- 040 53433511
Blockchain Technology.- Enhancing Permissioned Blockchains with Controlled Data Authorization.- FXChain a multi consortium blockchain with flexible privacy preserving strategies.- An Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network.- Lightweight Instance Batch Schemes towards Prover efficient Decentralized Private Computation.- CrossAAD Cross-chain Abnormal Account Detection.- AegisDB Scalable Blockchain Database with Secure Decentralised Load Balancing.- Towards Scalable and Secure IoTs Transactions A New Bi directional Payment Channel without Third Party Monitoring.- Privacy Enhancing Technologies.- Understanding Privacy in Smart Speakers A Narrative Review.- RPPDFL A Robustness and Privacy Preserving Decentralized Federated Learning System.- FedSCD Federated learning with Semi centralization Discrepancy awareness and Dual model Collaboration.- Pirates Anonymous Group Calls Over Fully Untrusted Infrastructure.- SecuPath A Secure and Privacy Preserving Multiparty Path Planning Framework in UAV Applications.- System Security.- TSHMD Explainable Deep Learning for Time Series HPCs based IoT Malware Detection.- Security Research for Android Remote Assistance Apps.- SynBoost Robust Text Generation Model Via Beam Search and Synonym Driven Boosting.- CCED A Configuration Failure Prevention Method for Autonomous Driving Systems.- Action Driven UAV Fingerprint Verification with Perception Data.- AggNoteBot A Robust Botnet Building using Aggressive Cloud Notes.- Network Security.- FSAM Framework for Online CDN based Website Classification.- Towards Private Multi-Operator Network Slicing.- AI Security.- An Encrypted Traffic Classification Framework Based on Higher Interaction Graph Neural Network.- PassTSL Modeling Human Created Passwords through Two Stage Learning.- Detect Llama Finding Vulnerabilities in Smart Contracts using Large Language Models.- MMOOC A Multimodal Misinformation Dataset for Out of Context News Analysis.
Blockchain Technology.- Enhancing Permissioned Blockchains with Controlled Data Authorization.- FXChain a multi consortium blockchain with flexible privacy preserving strategies.- An Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network.- Lightweight Instance Batch Schemes towards Prover efficient Decentralized Private Computation.- CrossAAD Cross-chain Abnormal Account Detection.- AegisDB Scalable Blockchain Database with Secure Decentralised Load Balancing.- Towards Scalable and Secure IoTs Transactions A New Bi directional Payment Channel without Third Party Monitoring.- Privacy Enhancing Technologies.- Understanding Privacy in Smart Speakers A Narrative Review.- RPPDFL A Robustness and Privacy Preserving Decentralized Federated Learning System.- FedSCD Federated learning with Semi centralization Discrepancy awareness and Dual model Collaboration.- Pirates Anonymous Group Calls Over Fully Untrusted Infrastructure.- SecuPath A Secure and Privacy Preserving Multiparty Path Planning Framework in UAV Applications.- System Security.- TSHMD Explainable Deep Learning for Time Series HPCs based IoT Malware Detection.- Security Research for Android Remote Assistance Apps.- SynBoost Robust Text Generation Model Via Beam Search and Synonym Driven Boosting.- CCED A Configuration Failure Prevention Method for Autonomous Driving Systems.- Action Driven UAV Fingerprint Verification with Perception Data.- AggNoteBot A Robust Botnet Building using Aggressive Cloud Notes.- Network Security.- FSAM Framework for Online CDN based Website Classification.- Towards Private Multi-Operator Network Slicing.- AI Security.- An Encrypted Traffic Classification Framework Based on Higher Interaction Graph Neural Network.- PassTSL Modeling Human Created Passwords through Two Stage Learning.- Detect Llama Finding Vulnerabilities in Smart Contracts using Large Language Models.- MMOOC A Multimodal Misinformation Dataset for Out of Context News Analysis.