Buch, Englisch, 464 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 721 g
Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
Buch, Englisch, 464 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 721 g
Reihe: Communications in Computer and Information Science
ISBN: 978-981-97-1273-1
Verlag: Springer Nature Singapore
The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Cyberspace Security.- Bilateral Personalized Information Fusion in Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in Binary Similarity Systems.- How does post-quantum cryptography affect Central Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model.- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.- Process Mining with Programmable Logic ControllerMemory States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A Machine Learning-based Detection Method for Interest Flooding Attacks in VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of privacy data in service cooperation.- Privacy-preserving Blockchain-based Traceability System with Decentralized Ciphertext-Policy Attribute-based Encryption.- A Probability Mapping-Based Privacy Preservation Method for Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep Learning.- Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for Data Storage and Query Processing.- Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.