Ubiquitous Security (eBook, PDF)
First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers
Redaktion: Wang, Guojun; Crispo, Bruno; Xu, Yang; Ko, Ryan K. L.; Choo, Kim-Kwang Raymond
65,95 €
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
65,95 €
Als Download kaufen
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
33 °P sammeln
Ubiquitous Security (eBook, PDF)
First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers
Redaktion: Wang, Guojun; Crispo, Bruno; Xu, Yang; Ko, Ryan K. L.; Choo, Kim-Kwang Raymond
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021. The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 29.7MB
Andere Kunden interessierten sich auch für
- Trends in Computational Intelligence, Security and Internet of Things (eBook, PDF)40,95 €
- Artificial Intelligence and Security (eBook, PDF)40,95 €
- Deployable Machine Learning for Security Defense (eBook, PDF)61,95 €
- Data Mining and Big Data (eBook, PDF)73,95 €
- Mobile Multimedia Communications (eBook, PDF)97,95 €
- Applied Cryptography in Computer and Communications (eBook, PDF)61,95 €
- Passive and Active Measurement (eBook, PDF)89,95 €
-
-
-
This volume constitutes selected papers presented at the First Inernational Conference on Ubiquitous Security, UbiSec 2021, held in Guangzhou, China, in December 2021.
The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 380
- Erscheinungstermin: 25. Februar 2022
- Englisch
- ISBN-13: 9789811904684
- Artikelnr.: 63509755
- Verlag: Springer Nature Singapore
- Seitenzahl: 380
- Erscheinungstermin: 25. Februar 2022
- Englisch
- ISBN-13: 9789811904684
- Artikelnr.: 63509755
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks.- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning.- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes.- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm.- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem.- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks.- Smart Search over Encrypted Educational Resources in Cloud Storage.- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media.- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network.- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity.- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System.- Skill Reward for Safe Deep Reinforcement Learning.- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks.- Reliable and Controllable Data Sharing Based on Blockchain,. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN.- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks.- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS).- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset.- Towards Evaluating the Effectiveness of Botnet Detection Techniques.- A Robust Malware Detection Approach for Android System based on Ensemble Learning.- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals.- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method.- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment.- An Edge-Cloud Collaborative Object Detection System.
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks.- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning.- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes.- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm.- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem.- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks.- Smart Search over Encrypted Educational Resources in Cloud Storage.- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media.- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network.- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity.- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System.- Skill Reward for Safe Deep Reinforcement Learning.- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks.- Reliable and Controllable Data Sharing Based on Blockchain,. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN.- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks.- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS).- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset.- Towards Evaluating the Effectiveness of Botnet Detection Techniques.- A Robust Malware Detection Approach for Android System based on Ensemble Learning.- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals.- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method.- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment.- An Edge-Cloud Collaborative Object Detection System.