Atjaunināt sīkdatņu piekrišanu

Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers 2019 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 276 pages, height x width: 235x155 mm, weight: 454 g, 59 Illustrations, color; 138 Illustrations, black and white; XII, 276 p. 197 illus., 59 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1095
  • Izdošanas datums: 24-Oct-2019
  • Izdevniecība: Springer Verlag, Singapore
  • ISBN-10: 9811507570
  • ISBN-13: 9789811507571
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 276 pages, height x width: 235x155 mm, weight: 454 g, 59 Illustrations, color; 138 Illustrations, black and white; XII, 276 p. 197 illus., 59 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1095
  • Izdošanas datums: 24-Oct-2019
  • Izdevniecība: Springer Verlag, Singapore
  • ISBN-10: 9811507570
  • ISBN-13: 9789811507571
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. 

The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.


Web Scanner Detection Based on Behavioral Differences.- DMU-ABSE:
Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion
And User Revocation.- A Novel Lattice-based Ciphertext-Policy Attribute-Based
Proxy Re-Encryption for Cloud Sharing.- Blockchain-based Asymmetric Group Key
Agreement Protocol for Mobile Ad Hoc Network.- Development of an Early
Warning System for Network Intrusion Detection using Benfords Law
Features.- An RTP Extension for Reliable User-data Transmission over VoIP
Traffic.- A Hybrid Covert Channel with Feedback over Mobile
Networks.- Cloud-Aided Privacy Preserving User Authentication and Key
Agreement Protocol for Internet of Things.- Integer Version of Ring-LWE and
its Applications.- Correlate the Advanced Persistent Threat Alerts and Logs
for Cyber Situation Comprehension.- A Secure Fine-Grained Micro-Video
Subscribing System in Cloud Computing.- Exploit in smart devices: A case
study.- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in
Zhihu.- Online Event Detection in Social Media with Bursty Event
Recognition.- Predicting Users' Emotional Intelligence with Social Networking
Data.- Design and Implementation of Medical Dispute Governance Based on
Blockchain.- Greedily Remove k links to hide important individuals in social
network.- Man-in-the-Middle Attacks on Electrical Power Grid SCADA
System.- Blockchain-based Threshold Electronic Voting System.- PassGrid:
Towards Graph-Supplemented Textual Shoulder Surfing Resistant
Authentication.- Learning from Imbalanced Data: A Comparative Study.