Wang / Meng / Min | Ubiquitous Security | Buch | 978-981-97-1273-1 | sack.de

Buch, Englisch, 464 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 721 g

Reihe: Communications in Computer and Information Science

Wang / Meng / Min

Ubiquitous Security

Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
2024
ISBN: 978-981-97-1273-1
Verlag: Springer Nature Singapore

Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

Buch, Englisch, 464 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 721 g

Reihe: Communications in Computer and Information Science

ISBN: 978-981-97-1273-1
Verlag: Springer Nature Singapore


This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 1–3, 2023.
The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity
Wang / Meng / Min Ubiquitous Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Cyberspace Security.- Bilateral Personalized Information Fusion in Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in Binary Similarity Systems.- How does post-quantum cryptography affect Central Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model.- A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.- Process Mining with Programmable Logic ControllerMemory States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A Machine Learning-based Detection Method for Interest Flooding Attacks in VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of privacy data in service cooperation.- Privacy-preserving Blockchain-based Traceability System with Decentralized Ciphertext-Policy Attribute-based Encryption.- A Probability Mapping-Based Privacy Preservation Method for Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep Learning.- Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for Data Storage and Query Processing.- Is it Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge Graph to Permit Interoperability of Heterogeneous Digital Evidence.- SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.