Ubiquitous Security (eBook, PDF)
Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
Redaktion: Wang, Guojun; Meng, Weizhi; Georgalas, Nektarios; Min, Geyong; Wang, Haozhe
Alle Infos zum eBook verschenken
Ubiquitous Security (eBook, PDF)
Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
Redaktion: Wang, Guojun; Meng, Weizhi; Georgalas, Nektarios; Min, Geyong; Wang, Haozhe
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1-3, 2023. The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 29.87MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 464
- Erscheinungstermin: 12. März 2024
- Englisch
- ISBN-13: 9789819712748
- Artikelnr.: 70175330
- Verlag: Springer Nature Singapore
- Seitenzahl: 464
- Erscheinungstermin: 12. März 2024
- Englisch
- ISBN-13: 9789819712748
- Artikelnr.: 70175330
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Bilateral Personalized Information Fusion in Mobile Crowdsensing.
BiBERT
AV: Enhancing Authorship Verification through Siamese Networks with Pre
trainedBERT and Bi
LSTM.
Impact of Library Code in Binary Similarity Systems.
How does post
quantum cryptography affect Central Bank Digital Currency?.
FRAD: Front
Running Attacks Detection on Ethereum using Ternary Classification Model.
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.
Process Mining with Programmable Logic ControllerMemory States.
Honey
Gauge: Enabling User
Centric HoneypotClassification.
Improving DNS Data Ex
filtration Detection through Temporal Analysis.
Deploying Post
Quantum Algorithms in Existing Applications and Embedded Devices.
SCORD: Shuffling Column
Oriented Relational Database to Enhance Security.
A SLAHP in the face of DLL Search Order Hijacking.
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.
Channel Spatio
temporal Convolutional Network for Pedestrian Trajectory Prediction.
Multi
NetDroid: Multi
layer Perceptron Neural Network for Android Malware Detection.
SmartBuoy: A Machine Learning
based Detection Method for Interest Flooding Attacks in VNDN.
Cyberspace Privacy.
Loft: An architecture for lifetime management of privacy data in service cooperation.
Privacy
preserving Blockchain
based Traceability System with Decentralized Ciphertext
Policy Attribute
based Encryption.
A Probability Mapping
Based Privacy Preservation Method for Social Networks.
TruFaaS
Trust Verification Framework for FaaS.
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.
Privacy
Preservi Fall Detection in Elderly People Using Deep Learning.
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.
Cyberspace Anonymity.
Simulation of Mixmining Reward Parameters for NymMixnet.
Blockchain
based Privacy
Preservation Platform for Data Storage and Query Processing.
Is it Really You Who Forgot the Password? When Account Recovery Meets Risk
Based Authentication.
A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi
Agent Systems.
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
Bilateral Personalized Information Fusion in Mobile Crowdsensing.
BiBERT
AV: Enhancing Authorship Verification through Siamese Networks with Pre
trainedBERT and Bi
LSTM.
Impact of Library Code in Binary Similarity Systems.
How does post
quantum cryptography affect Central Bank Digital Currency?.
FRAD: Front
Running Attacks Detection on Ethereum using Ternary Classification Model.
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.
Process Mining with Programmable Logic ControllerMemory States.
Honey
Gauge: Enabling User
Centric HoneypotClassification.
Improving DNS Data Ex
filtration Detection through Temporal Analysis.
Deploying Post
Quantum Algorithms in Existing Applications and Embedded Devices.
SCORD: Shuffling Column
Oriented Relational Database to Enhance Security.
A SLAHP in the face of DLL Search Order Hijacking.
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.
Channel Spatio
temporal Convolutional Network for Pedestrian Trajectory Prediction.
Multi
NetDroid: Multi
layer Perceptron Neural Network for Android Malware Detection.
SmartBuoy: A Machine Learning
based Detection Method for Interest Flooding Attacks in VNDN.
Cyberspace Privacy.
Loft: An architecture for lifetime management of privacy data in service cooperation.
Privacy
preserving Blockchain
based Traceability System with Decentralized Ciphertext
Policy Attribute
based Encryption.
A Probability Mapping
Based Privacy Preservation Method for Social Networks.
TruFaaS
Trust Verification Framework for FaaS.
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.
Privacy
Preservi Fall Detection in Elderly People Using Deep Learning.
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.
Cyberspace Anonymity.
Simulation of Mixmining Reward Parameters for NymMixnet.
Blockchain
based Privacy
Preservation Platform for Data Storage and Query Processing.
Is it Really You Who Forgot the Password? When Account Recovery Meets Risk
Based Authentication.
A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi
Agent Systems.
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.