Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Frontiers in cyber security = 5th In...
~
International Conference on Frontiers in Cyber Security (2022 :)
Linked to FindBook
Google Book
Amazon
博客來
Frontiers in cyber security = 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Frontiers in cyber security/ edited by Emmanuel Ahene, Fagen Li.
Reminder of title:
5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022 : proceedings /
remainder title:
FCS 2022
other author:
Ahene, Emmanuel.
corporate name:
International Conference on Frontiers in Cyber Security
Published:
Singapore :Springer Nature Singapore : : 2022.,
Description:
xiii, 430 p. :ill. (some color), digital ;24 cm.
[NT 15003449]:
IoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-981-19-8445-7
ISBN:
9789811984457
Frontiers in cyber security = 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022 : proceedings /
Frontiers in cyber security
5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022 : proceedings /[electronic resource] :FCS 2022edited by Emmanuel Ahene, Fagen Li. - Singapore :Springer Nature Singapore :2022. - xiii, 430 p. :ill. (some color), digital ;24 cm. - Communications in computer and information science,17261865-0937 ;. - Communications in computer and information science ;1726..
IoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
ISBN: 9789811984457
Standard No.: 10.1007/978-981-19-8445-7doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / F76 2022
Dewey Class. No.: 005.8
Frontiers in cyber security = 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022 : proceedings /
LDR
:04127nmm a2200373 a 4500
001
2305501
003
DE-He213
005
20221202140832.0
006
m d
007
cr nn 008maaau
008
230409s2022 si s 0 eng d
020
$a
9789811984457
$q
(electronic bk.)
020
$a
9789811984440
$q
(paper)
024
7
$a
10.1007/978-981-19-8445-7
$2
doi
035
$a
978-981-19-8445-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
F76 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2022
111
2
$a
International Conference on Frontiers in Cyber Security
$n
(5th :
$d
2022 :
$c
Kumasi, Ghana)
$3
3608619
245
1 0
$a
Frontiers in cyber security
$h
[electronic resource] :
$b
5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022 : proceedings /
$c
edited by Emmanuel Ahene, Fagen Li.
246
3
$a
FCS 2022
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
xiii, 430 p. :
$b
ill. (some color), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1726
505
0
$a
IoT Security -- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT -- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles -- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building -- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government -- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things -- Artificial Intelligence and Cyber Security -- Cross-site Scripting Threat Intelligence Detection based on Deep Learning -- Power Analysis Attack Based on Lightweight Convolutional Neural Network -- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms -- SVFLS: A Secure and Verifiable Federated Learning Training Scheme -- A Pragmatic Label-Specific Backdoor Attack -- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source -- Blockchain Technology and Application -- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment -- Blockchain-based Patient-to-Patient Health Data Sharing -- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain -- Ethereum Contract Honeypot Risk Analysis -- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains -- Cryptography -- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme -- New Trapdoor and Preimage Sampling on NTRU Lattice -- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature -- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares -- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage -- Database Security -- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme -- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern -- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing -- Quantum Cryptography -- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate -- Network Security -- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.
520
$a
This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
844596
650
0
$a
Blockchains (Databases)
$v
Congresses.
$3
3411900
650
0
$a
Internet of things
$v
Congresses.
$3
3135380
700
1
$a
Ahene, Emmanuel.
$3
3608620
700
1
$a
Li, Fagen.
$3
3608621
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1726.
$3
3608622
856
4 0
$u
https://doi.org/10.1007/978-981-19-8445-7
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9447050
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 F76 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login