Atjaunināt sīkdatņu piekrišanu

E-grāmata: Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 13787
  • Izdošanas datums: 06-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031230202
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 118,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 13787
  • Izdošanas datums: 06-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031230202
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.

The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

AI for Network Security.- Vulnerability Detection Using Deep Learning
Based Function Classification.- RAIDER: Reinforcement-aided Spear Phishing
Detector.- Network Intrusion Detection Adversarial Attacks for LEO
Constellation Networks Based on Deep Learning.- A Proof of Concept
Implementation of Explainable Artificial Intelligence (XAI) in Digital
Forensics.- Graph Intelligence Enhanced Bi-Channel Insider Threat
Detection.- Network Security.- Exploiting Redundancy in Network Flow
Information for Efficient Security Attack Detection.- A Learning Methodology
for Line-Rate Ransomware Mitigation with P4 Switches.- Reducing Intrusion
Alert Trees to Aid Visualization.- Attacker Attribution Through
Characteristics Inference Using Honeypot Data.- Detecting Contradictions from
CoAP RFC Based on Knowledge Graph.- Mobile Security.- A First Look at Android
Apps Third-party Resources Loading.- Comprehensive Mobile Traffic
Characterization Based on a Large-Scale Mobile Traffic Dataset.- DOT-M: A
Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted
Mobile Devices.- A Beyond-5G Authentication and Key Agreement Protocol.- IoT
Security.- A Survey on IoT Vulnerability Discovery.- Differentiated Security
Architecture for Secure and Efficient Infotainment Data Communication in IoV
Networks.- An Efficient Authenticated Group Key Agreement Protocol with
Dynamic Batch Verification for Secure Distributed Networks.- Leveraging Frame
Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack
Detection.- Supporting Cyber-Attacks and System Anomaly Detection Research
with an Industry 4.0 Dataset.- Privacy-Preserving Machine Learning Protocols
and Systems.- The Force of Compensation, A Multi-stage Incentive Mechanism
Model for Federated Learning.- A Privacy-Preserving Distributed Machine
Learning Protocol Based on Homomorphic Hash Authentication.- An Efficient
Clustering-Based Privacy-Preserving Recommender System.- A Differential
Privacy Mechanism for Deceiving Cyber Attacks in IoT
Networks.- Privacy-Preserving Networked Systems and
Protocols.- Privacy-Preserving Online Ride-Hailing Matching System with an
Untrusted Server.- Efficient and Fine-Grained Sharing of Signed Healthcare
Data in Smart Healthcare.- Enabling Secure Deduplication in Encrypted
Decentralized Storage.- Geometric Range Searchable Encryption with Forward
and Backward Security.- Blockchain Security.- Towards Secure and Trustworthy
Flash Loans: A Blockchain-based Trust Management Approach.- Forward
Traceability for Product Authenticity Using Ethereum Smart Contracts.- BSB:
Bringing Safe Browsing to Blockchain Platform.- Blockchain-Powered
Systems.- Practical Anonymous Multi-Hop Locks for Lightning Network
Compatible Payment Channel Networks.- Blockchain Based Regulatory Technology
Deployment for Real Estate Transaction.- CVallet: a Blockchain-Oriented
Application Development for Education and Recruitment.- Decentralized Access
Control for Secure Microservices Cooperation with
Blockchain.- Blockchain-Based Access Control for Smart Manufacturer Secure
Management System.- Attacks.- Driver Locations Harvesting Attack on
pRide.- Rebound Attacks on SKINNY Hashing with Automatic Tools.- Combination
Reduction Algorithms and its Application to Subversion Attack.- Cryptographic
Algorithms and Protocols.- Evaluating the Security of Merkle-Damgard Hash
Functions and Combiners in Quantum Settings.- An Efficient Lattice-Based
Encrypted Search Scheme with Forward Security.- Strengthening the Security of
AES Against Differential Fault Attack