回首頁 到查詢結果 [ subject:"Computer Crime." ]

Ubiquitous security = first Internat...
International Conference on Ubiquitous Security (2021 :)

FindBook      Google Book      Amazon      博客來     
  • Ubiquitous security = first International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Ubiquitous security/ edited by Guojun Wang ... [et al.].
    其他題名: first International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021 : revised selected papers /
    其他題名: UbiSec 2021
    其他作者: Wang, Guojun.
    團體作者: International Conference on Ubiquitous Security
    出版者: Singapore :Springer Singapore : : 2022.,
    面頁冊數: xvii, 380 p. :ill., digital ;24 cm.
    內容註: A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks -- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning -- A Fine-grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes -- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm -- Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem -- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks -- Smart Search over Encrypted Educational Resources in Cloud Storage -- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets -- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media -- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network -- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids Privacy-preserving Cluster Validity -- A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments Design & Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System -- Skill Reward for Safe Deep Reinforcement Learning -- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks -- Reliable and Controllable Data Sharing Based on Blockchain. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN -- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks -- Towards a Two-tier Architecture for Privacy-enabled Recommender Systems (PeRS) -- A Supervised Rare Anomaly Detection Technique via Cooperative Co-Evolution-Based Feature Selection using Benchmark UNSW_NB15 Dataset -- Towards Evaluating the Effectiveness of Botnet Detection Techniques -- A Robust Malware Detection Approach for Android System based on Ensemble Learning -- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals -- A Fine-tuning Strategy Based on Real Scenes in Gait Identification An Online Automated Anti-Anti-Virus Method -- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment -- An Edge-Cloud Collaborative Object Detection System.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-19-0468-4
    ISBN: 9789811904684
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入