Atjaunināt sīkdatņu piekrišanu

Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 13, 2023, Revised Selected Papers 2024 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 464 pages, height x width: 235x155 mm, 135 Illustrations, color; 21 Illustrations, black and white; XV, 464 p. 156 illus., 135 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 2034
  • Izdošanas datums: 13-Mar-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 9819712734
  • ISBN-13: 9789819712731
  • Mīkstie vāki
  • Cena: 82,61 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 97,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 464 pages, height x width: 235x155 mm, 135 Illustrations, color; 21 Illustrations, black and white; XV, 464 p. 156 illus., 135 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 2034
  • Izdošanas datums: 13-Mar-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 9819712734
  • ISBN-13: 9789819712731
This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 13, 2023. The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity









 
Cyberspace Security.- Bilateral Personalized Information Fusion in
Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through
Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in
Binary Similarity Systems.- How does post-quantum cryptography affect Central
Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum
using Ternary Classification Model.- A Comprehensive Survey of Attack
Techniques, Implementation, and Mitigation Strategies in Large Language
Models.- Process Mining with Programmable Logic ControllerMemory
States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving
DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying
Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD:
Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP
in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated
Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional
Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer
Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A
Machine Learning-based Detection Method for Interest Flooding Attacks in
VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of
privacy data in service cooperation.- Privacy-preserving Blockchain-based
Traceability System with Decentralized Ciphertext-Policy Attribute-based
Encryption.- A Probability Mapping-Based Privacy Preservation Method for
Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection
of Cyberbullying in Social Media Texts Using Explainable Artificial
Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep
Learning.- Research on Authorization Model of Attribute Access Control Based
on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward
Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for
Data Storage and Query Processing.- Is it Really You Who Forgot the Password?
When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge
Graph to Permit Interoperability of Heterogeneous Digital Evidence.-
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for
Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32
Binaries Using Architecture Features.