Atjaunināt sīkdatņu piekrišanu

Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 2830, 2024, Proceedings, Part II [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 82,61 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 97,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
Citas grāmatas par šo tēmu:
This four-volume set LNISCT 627-630 constitutes the proceedings of the 20th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2024, held in Dubai, United Arab Emirates during October 28 - 30, 2024.



The 81 full papers were carefully reviewed and selected from 225 submissions. The proceedings focus on



Privacy and Cryptography



AI for cybersecurity and Adversial models



Quantum Computing in Cybersecurity



Network Security



Blockchain and Cryptocurrencies



Fuzzing and IoT security



Malware and Attack Analysis



Web Security



Authentication



Large Language Model for Cybersecurity



Security Assessments
Network Security.- RFI: Enhancing Network Intrusion Detection
through Robust Feature Selection Techniques.- HyperBC: Hypergraph-based
Approach for Behavior Cluster of Suspicious APT Attacks.- MEMO: Detecting
Unknown Malicious Encrypted Traffic via Metric Learning and Order aware Pre
training.- Interoperable Security Information and Event
Management Framework for Multi Cloud Environment.- Anti-EMP: Encrypted
Malware Packets Filtering Algorithm Leveraging Ciphertext Patterns under
Zero Knowledge Setting.- Is This the Same Code? A Comprehensive Study
of Decompilation Techniques for WebAssembly Binaries.- Distributed Intrusion
Detection in Dynamic Networks of UAVs using Few Shot Federated Learning.-
Interference Avoidance and Mitigation Technique Utilizing Cooperative
Characterization of Interferers in Dense Wireless Networks.- A Border
Management Protocol for Multi Identifier Network within the Network Layer and
Its Attack Detection Extension.- VLDoS Variable Low rate DoS Attack Model for
BBR algorithm in TCP.- FullView: Using Bidirectional Group Sequences to
Achieve Accurate Encrypted Traffic Classification.- TEE-Receipt: A TEE based
Non repudiation Framework for Web Applications.- An Incentive Mechanism for
Enhancing Transaction Privacy Based on Reputation Perception and Double
Auction.- Dynamically Expanding Factor Base of Index Calculus Algorithm to
Solve Massive Discrete Logarithm Problems Faster.- Blockchain and
Cryptocurrencies.- ASOZ: Anonymous and Auditable Cryptocurrency with
Enhanced Confidential Transaction.- Identity Inference in Ethereum: Towards
Financial Security for Blockchain Ecosystem.- SMDT: A Blockchain based Secure
Multi version Data
Trading Scheme with Fair Profit Sharing.- Substitution Attacks on Asymmetric
(Group) Message Franking.- Symerge: Replacing Calls in Under Constrained
Symbolic Execution and Find Vulnerabilities.- Threshold Key Management and
Signature in Dynamic Distributed System.