語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Ubiquitous security = second Interna...
~
International Conference on Ubiquitous Security (2022 :)
FindBook
Google Book
Amazon
博客來
Ubiquitous security = second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Ubiquitous security/ edited by Guojun Wang ... [et al.].
其他題名:
second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022 : revised selected papers /
其他題名:
UBISEC 2022
其他作者:
Wang, Guojun.
團體作者:
International Conference on Ubiquitous Security
出版者:
Singapore :Springer Nature Singapore : : 2023.,
面頁冊數:
xix, 558 p. :ill., digital ;24 cm.
內容註:
Cyberspace Security -- Support Tool Selection in Digital Forensics Training -- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication -- A Hybrid Secure Two-party Protocol for Vertical Federated Learning -- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM -- CATS: A serious game in industry towards stronger cloud security -- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing -- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection -- Vulnerability Detection with Representation Learning -- Assessing Vulnerability from Its Description -- Malware Traffic Classification Based on GAN and BP Neural Networks -- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications -- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning -- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study -- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection -- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning -- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety -- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) -- Android Malware Detection: A Literature Review -- Threat Modeling in Cloud Computing - A Literature Review -- A New Signal Packing Algorithm for CAN-FD with Security Consideration -- An Adversarial Sample Defense Method based on Saliency Information -- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning -- Cyberspace Privacy -- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis -- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing -- Encryption Proxies in a Confidential Computing Environment -- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization -- Differentially Private Clustering Algorithm for Mixed Data -- Impact Of Reenactment Programs on Young Generation -- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning -- Cyberspace Anonymity -- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization -- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates -- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems -- Short Papers -- Garbage recognition algorithm based on self-attention mechanism and deep sorting -- Approaches for Zero Trust Adoption Based Upon Organization Security Level -- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network -- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-99-0272-9
ISBN:
9789819902729
Ubiquitous security = second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022 : revised selected papers /
Ubiquitous security
second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022 : revised selected papers /[electronic resource] :UBISEC 2022edited by Guojun Wang ... [et al.]. - Singapore :Springer Nature Singapore :2023. - xix, 558 p. :ill., digital ;24 cm. - Communications in computer and information science,17681865-0937 ;. - Communications in computer and information science ;1768..
Cyberspace Security -- Support Tool Selection in Digital Forensics Training -- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication -- A Hybrid Secure Two-party Protocol for Vertical Federated Learning -- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM -- CATS: A serious game in industry towards stronger cloud security -- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing -- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection -- Vulnerability Detection with Representation Learning -- Assessing Vulnerability from Its Description -- Malware Traffic Classification Based on GAN and BP Neural Networks -- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications -- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning -- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study -- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection -- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning -- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety -- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) -- Android Malware Detection: A Literature Review -- Threat Modeling in Cloud Computing - A Literature Review -- A New Signal Packing Algorithm for CAN-FD with Security Consideration -- An Adversarial Sample Defense Method based on Saliency Information -- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning -- Cyberspace Privacy -- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis -- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing -- Encryption Proxies in a Confidential Computing Environment -- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization -- Differentially Private Clustering Algorithm for Mixed Data -- Impact Of Reenactment Programs on Young Generation -- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning -- Cyberspace Anonymity -- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization -- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates -- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems -- Short Papers -- Garbage recognition algorithm based on self-attention mechanism and deep sorting -- Approaches for Zero Trust Adoption Based Upon Organization Security Level -- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network -- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28-31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.
ISBN: 9789819902729
Standard No.: 10.1007/978-981-99-0272-9doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.76.A65 / I58 2022
Dewey Class. No.: 005.8
Ubiquitous security = second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022 : revised selected papers /
LDR
:04838nmm a2200349 a 4500
001
2315613
003
DE-He213
005
20230218010126.0
006
m d
007
cr nn 008maaau
008
230902s2023 si s 0 eng d
020
$a
9789819902729
$q
(electronic bk.)
020
$a
9789819902712
$q
(paper)
024
7
$a
10.1007/978-981-99-0272-9
$2
doi
035
$a
978-981-99-0272-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.A65
$b
I58 2022
072
7
$a
UB
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UX
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.76.A65
$b
I61 2022
111
2
$a
International Conference on Ubiquitous Security
$n
(2nd :
$d
2022 :
$c
Zhangjiajie, China)
$3
3628082
245
1 0
$a
Ubiquitous security
$h
[electronic resource] :
$b
second International Conference, UBISEC 2022, Zhangjiajie, China, December 28-31, 2022 : revised selected papers /
$c
edited by Guojun Wang ... [et al.].
246
3
$a
UBISEC 2022
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2023.
300
$a
xix, 558 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1768
505
0
$a
Cyberspace Security -- Support Tool Selection in Digital Forensics Training -- Listen to the Music: Evaluating the Use of Music in Audio Based Authentication -- A Hybrid Secure Two-party Protocol for Vertical Federated Learning -- Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label lassification Model Using CNN-BiLSTM -- CATS: A serious game in industry towards stronger cloud security -- Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing -- System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection -- Vulnerability Detection with Representation Learning -- Assessing Vulnerability from Its Description -- Malware Traffic Classification Based on GAN and BP Neural Networks -- Source Code Vulnerability Detection using Deep Learning Algorithms for Industrial Applications -- Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning -- Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study -- An Aspect-Based Semi-Supervised Generative Model for Online Review Spam Detection -- Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning -- Improved DeepLabV3+ based Railway track extraction to Enhance Railway Transportation Safety -- Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA) -- Android Malware Detection: A Literature Review -- Threat Modeling in Cloud Computing - A Literature Review -- A New Signal Packing Algorithm for CAN-FD with Security Consideration -- An Adversarial Sample Defense Method based on Saliency Information -- BlockLearning: A Modular Framework for Blockchain-based Vertical Federated Learning -- Cyberspace Privacy -- An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis -- Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing -- Encryption Proxies in a Confidential Computing Environment -- FedTA:Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization -- Differentially Private Clustering Algorithm for Mixed Data -- Impact Of Reenactment Programs on Young Generation -- Sensor Cloud Data Privacy Protection Model Based On Collaborative Deep Learning -- Cyberspace Anonymity -- An Improved Cuckoo Search Algorithm and Its Application in Function Optimization -- Empirical Likelihood for PLSIM with Missing Response Variables and Error-prone Covariates -- High-speed Anonymous Device Authentication without Asymmetric Cryptography in the Internet-of-Things -- A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud -- A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-based Applications in Cyber-Physical Systems -- Short Papers -- Garbage recognition algorithm based on self-attention mechanism and deep sorting -- Approaches for Zero Trust Adoption Based Upon Organization Security Level -- Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network -- On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
520
$a
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28-31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Computer Application in Social and Behavioral Sciences.
$3
3538516
700
1
$a
Wang, Guojun.
$3
1937162
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1768.
$3
3628083
856
4 0
$u
https://doi.org/10.1007/978-981-99-0272-9
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9451863
電子資源
11.線上閱覽_V
電子書
EB QA76.76.A65 I58 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入