Science of Cyber Security: 4th International Conference, SciSec 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers: Lecture Notes in Computer Science, cartea 13580
Editat de Chunhua Su, Kouichi Sakurai, Feng Liuen Limba Engleză Paperback – 30 sep 2022
The 36 full papers presented in this volume were carefully reviewed and selected from 88 submissions. The papers are organized in the following topical sections: blockchain and applications; cryptography and applications; network security; cyber-physical system; malware; mobile system security; system and web security; security in financial industry; social engineering and personalized security; privacy and anonymity.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 340.32 lei
- 20% Preț: 341.95 lei
- 20% Preț: 453.32 lei
- 20% Preț: 238.01 lei
- 20% Preț: 340.32 lei
- 20% Preț: 438.69 lei
- Preț: 449.57 lei
- 20% Preț: 343.62 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 645.28 lei
- 17% Preț: 427.22 lei
- 20% Preț: 655.02 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 591.51 lei
- Preț: 381.21 lei
- 20% Preț: 337.00 lei
- 15% Preț: 438.59 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 575.48 lei
- 20% Preț: 583.40 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 353.50 lei
- 20% Preț: 585.88 lei
- Preț: 410.88 lei
- 20% Preț: 596.46 lei
- 20% Preț: 763.23 lei
- 20% Preț: 825.93 lei
- 20% Preț: 649.49 lei
- 20% Preț: 350.21 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 346.90 lei
Preț vechi: 433.62 lei
-20% Nou
Puncte Express: 520
Preț estimativ în valută:
66.41€ • 69.29$ • 55.67£
66.41€ • 69.29$ • 55.67£
Carte tipărită la comandă
Livrare economică 12-26 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031175503
ISBN-10: 3031175506
Pagini: 576
Ilustrații: XII, 576 p. 184 illus., 112 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.82 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031175506
Pagini: 576
Ilustrații: XII, 576 p. 184 illus., 112 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.82 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Blockchain and Applications.- ChainSCAN: A Blockchain-based Supply Chain Alerting Framework for Food Safety.- BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain.- Adapted PBFT Consensus Protocol for Sharded Blockchain.- A Practical Blockchain-based Maintenance Record System for Better Aircraft Security.- Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback.- Cryptography and Applications.- Pitch in: A Secure Extension Signature based on SM9.- Verifiable DOPE from Semi-homomorphic Encryption, and the Extension to DOT.- Scalable M+1st-Price Auction with Infinite Bidding Price.- The Shared Memory based Cryptographic Card Virtualization.- Network Security.- Feature Transfer based Network Anomaly Detection.- Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN.- AtNet: A Novel Anti-tracking Network with Multi-party JudgementCapability based on Cross-domain Small-world Topology.- A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection.- Analysis and Detection against Overlapping Phenomenon of Behavioral Attribute in Network Attacks.- Integration of Cybersecurity related Development Processes by using a Quantification Method.- Cyber-Physical System.- ZoomPass: A Zoom-based Android Unlock Scheme on Smart Devices.- Metasploit for Cyber-Physical Security Testing with Real-Time Constraints.- Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems.- Malware.- Malware Classification Based on Semi-Supervised Learning.- Malware detected and tell me why: An verifiable malware detection model with graph metric learning.- Malware Detection using Automated Generation of Yara rules on Dynamic Features.- Mobile System Security.- Question Answering Models For Privacy Policies of Mobile Apps: Are We There Yet?.- Design of End-to-End Security for MQTT 5.0.- DroidFP: A Zero-Permission Detection Framework for Android Device Based on Gated Recurrent Unit.- System and Web Security.- An Intrusion Detection System based on Deep Belief Networks.- HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains.- AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series.- BASNEA: Threat Hunting for Ethereum Smart Contract based on Backtrackless Aligned-Spatial Network Entity Alignment.- Multi-region SRAM-Based TCAM for Longest Prefix.- Security in Financial Industry.- A solution for the offline double-spending issue of digital currencies.- A Hierarchical Macroeconomic Copula Model for Cyber Damages based on current Cyber Insurance Prices.- Social Engineering and Personalized Security.- Cyber Social Engineering Kill Chain.- Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects.- Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.- Privacy and Anonymity.- TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps.- A k-anonymity-based Robust Watermarking Scheme for Relational Database.