Atjaunināt sīkdatņu piekrišanu

E-grāmata: Ubiquitous Security: Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 88,63 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the proceedings of the Third International Conference, UbiSec 2023, held in Exeter, UK, during November 13, 2023. The 29 full papers were carefully reviewed and selected from 91 submissions. They were organized in following topical sections: Cyberspace Security, Cyberspace Privacy, Cyberspace Anonymity









 
Cyberspace Security.- Bilateral Personalized Information Fusion in
Mobile Crowdsensing.- BiBERT-AV: Enhancing Authorship Verification through
Siamese Networks with Pre-trainedBERT and Bi-LSTM.- Impact of Library Code in
Binary Similarity Systems.- How does post-quantum cryptography affect Central
Bank Digital Currency?.- FRAD: Front-Running Attacks Detection on Ethereum
using Ternary Classification Model.- A Comprehensive Survey of Attack
Techniques, Implementation, and Mitigation Strategies in Large Language
Models.- Process Mining with Programmable Logic ControllerMemory
States.- Honey-Gauge: Enabling User-Centric HoneypotClassification.-Improving
DNS Data Ex-filtration Detection through Temporal Analysis.- Deploying
Post-Quantum Algorithms in Existing Applications and Embedded Devices.-SCORD:
Shuffling Column-Oriented Relational Database to Enhance Security.- A SLAHP
in the face of DLL Search Order Hijacking.- Poison Egg: Scrambling Federated
Learning with Delayed Backdoor Attack.- Channel Spatio-temporal Convolutional
Network for Pedestrian Trajectory Prediction.- Multi-NetDroid: Multi-layer
Perceptron Neural Network for Android Malware Detection.- SmartBuoy: A
Machine Learning-based Detection Method for Interest Flooding Attacks in
VNDN.- Cyberspace Privacy.- Loft: An architecture for lifetime management of
privacy data in service cooperation.- Privacy-preserving Blockchain-based
Traceability System with Decentralized Ciphertext-Policy Attribute-based
Encryption.- A Probability Mapping-Based Privacy Preservation Method for
Social Networks.- TruFaaS - Trust Verification Framework for FaaS.- Detection
of Cyberbullying in Social Media Texts Using Explainable Artificial
Intelligence.- Privacy-Preservi Fall Detection in Elderly People Using Deep
Learning.- Research on Authorization Model of Attribute Access Control Based
on Knowledge Graph.- Cyberspace Anonymity.-Simulation of Mixmining Reward
Parameters for NymMixnet.- Blockchain-based Privacy-Preservation Platform for
Data Storage and Query Processing.- Is it Really You Who Forgot the Password?
When Account Recovery Meets Risk-Based Authentication.- A Unified Knowledge
Graph to Permit Interoperability of Heterogeneous Digital Evidence.-
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for
Multi-Agent Systems.- Automatically Inferring Image Base Addresses of ARM32
Binaries Using Architecture Features.