回首頁 到查詢結果 [ subject:"Computer networks- Security measures" ]

Network and system security = 16th I...
International Conference on Network and System Security (2022 :)

FindBook      Google Book      Amazon      博客來     
  • Network and system security = 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Network and system security/ edited by Xingliang Yuan ... [et al.].
    其他題名: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022 : proceedings /
    其他題名: NSS 2022
    其他作者: Yuan, Xingliang.
    團體作者: International Conference on Network and System Security
    出版者: Cham :Springer Nature Switzerland : : 2022.,
    面頁冊數: xv, 747 p. :ill. (some col.), digital ;24 cm.
    內容註: AI for Network Security -- Vulnerability Detection Using Deep Learning Based Function Classification -- RAIDER: Reinforcement-aided Spear Phishing Detector -- Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning -- A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics -- Graph Intelligence Enhanced Bi-Channel Insider Threat Detection -- Network Security -- Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection -- A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches -- Reducing Intrusion Alert Trees to Aid Visualization -- Attacker Attribution Through Characteristics Inference Using Honeypot Data -- Detecting Contradictions from CoAP RFC Based on Knowledge Graph -- Mobile Security -- A First Look at Android Apps' Third-party Resources Loading -- Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset -- DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices -- A Beyond-5G Authentication and Key Agreement Protocol -- IoT Security -- A Survey on IoT Vulnerability Discovery -- Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks -- An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks -- Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection -- Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset -- Privacy-Preserving Machine Learning Protocols and Systems -- The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning -- A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication -- An Efficient Clustering-Based Privacy-Preserving Recommender System -- A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks -- Privacy-Preserving Networked Systems and Protocols -- Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server -- Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare -- Enabling Secure Deduplication in Encrypted Decentralized Storage -- Geometric Range Searchable Encryption with Forward and Backward Security -- Blockchain Security -- Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach -- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts -- BSB: Bringing Safe Browsing to Blockchain Platform -- Blockchain-Powered Systems -- Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks -- Blockchain Based Regulatory Technology Deployment for Real Estate Transaction -- CVallet: a Blockchain-Oriented Application Development for Education and Recruitment -- Decentralized Access Control for Secure Microservices Cooperation with Blockchain -- Blockchain-Based Access Control for Smart Manufacturer Secure Management System -- Attacks -- Driver Locations Harvesting Attack on pRide -- Rebound Attacks on SKINNY Hashing with Automatic Tools -- Combination Reduction Algorithms and its Application to Subversion Attack -- Cryptographic Algorithms and Protocols -- Evaluating the Security of Merkle-Damg˚ard Hash Functions and Combiners in Quantum Settings -- An Efficient Lattice-Based Encrypted Search Scheme with Forward Security -- Strengthening the Security of AES Against Differential Fault Attack.
    Contained By: Springer Nature eBook
    標題: Computer networks - Security measures -
    電子資源: https://doi.org/10.1007/978-3-031-23020-2
    ISBN: 9783031230202
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入