Cantitate/Preț
Produs

Machine Learning for Cyber Security: 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4–6, 2023, Proceedings: Lecture Notes in Computer Science, cartea 14541

Editat de Dan Dongseong Kim, Chao Chen
en Limba Engleză Paperback – 23 apr 2024
This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Security, ML4CS 2023, held in Yanuca Island, Fiji, during December 4–6, 2023.
The 11 full papers presented in this book were carefully reviewed and selected from 35 submissions. They cover a variety of topics, including cybersecurity, AI security, machine learning security, encryption, authentication, data security and privacy, cybersecurity forensic analysis, vulnerability analysis, malware analysis, anomaly and intrusion detection.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 64120 lei

Preț vechi: 80151 lei
-20% Nou

Puncte Express: 962

Preț estimativ în valută:
12269 12810$ 10154£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789819724574
ISBN-10: 9819724570
Ilustrații: XII, 174 p. 69 illus., 59 illus. in color.
Dimensiuni: 155 x 235 mm
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Singapore, Singapore

Cuprins

Keystroke Transcription from Acoustic Emanations Using Continuous Wavelet Transform.- Strengthening Cyber Security Education Designing Robust Assessments for Chat GPT Generated Answers.- Pass File Graphical Password Authentication based on File Browsing Records.- On the Role of Similarity in Detecting Masquerading Files.- A Password-based Mutual Authenticated Key Exchange Scheme by Blockchain for WBAN.- Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle Road Collaboration.- A client side watermarking with private class in Federated learning.- Research on Evasion and Detection of Malicious JavaScript Code.- Tackling Non IID for Federated Learning with Components Alignment.- Security on top of Security Detecting Malicious Firewall Policy Changes via K Means Clustering.- Penetrating Machine Learning Servers via Exploiting BMC Vulnerability.