Duan / Debbabi / Au | Security and Privacy in Communication Networks | Buch | 978-3-031-64953-0 | sack.de

Buch, Englisch, Band 568, 517 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 803 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Duan / Debbabi / Au

Security and Privacy in Communication Networks

19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II

Buch, Englisch, Band 568, 517 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 803 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

ISBN: 978-3-031-64953-0
Verlag: Springer Nature Switzerland


This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.

The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:

Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.

Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
Duan / Debbabi / Au Security and Privacy in Communication Networks jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Intrusion and Anomaly Detection.- A Game Theoretical Analysis of Distributed Denial of Service Defense Incent.- DDoS Mitigation Dilemma Exposed A Two Wave Attack with Collateral Damage of Millions.- Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks.- MVTBA A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification.- POP-HIT Partially Order Preserving Hash Induced Transformation for Privacy Protection in Face Recognition Access Control. IoT Security.- Enhancing Cross Device Security with Fine Grained Permission Control.- The Security Analysis of ROS2 Communication.- VET Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors. Network Security.- A Stable Fine-grained Webpage Fingerprinting Aiming at the Unstable Realistic Network.- Securing Web Inputs using Parallel Session Attachments.- Unsupervised and Adaptive Tor Website Fingerprinting.- Visibility of Scan Traffic Trends in Sparsely Populated Darknets.- Privacy.- Do Backdoors Assist Membership Inference Attacks.- Efficient and Scalable Multi Party Privacy Preserving k NN Classification.- Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter.- PPEC Privacy Preserving and Cost Effective Incremental Density Peak Clustering Scheme for Profit Driven Clouds.- Practical Privacy Preserving Community Detection in Decentralized Weighted Networks.- Split Without a Leak Reducing Privacy Leakage in Split Learning.- Street Rep A Privacy Preserving Reputation Aggregation System.- Program Analysis.- Analyzing Implementation based SSL TLS Vulnerabilities with Binary Semantics Analysis.- Identifying Library Functions in Stripped Binary Combining Function Similarity and Call Graph Features.- PDFIET PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution.- Ransomware as a Service Demystifying Android Ransomware Generators.- Software Security.- CV2XFuzzer C V2X Parsing Vulnerability Discovery System Based on Fuzzing.- Learning AI coding style for software plagiarism detection.- Understanding and Measuring Inter Process Code Injection in Windows Malware.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.