Cantitate/Preț
Produs

Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers: Communications in Computer and Information Science, cartea 1095

Editat de Weizhi Meng, Steven Furnell
en Limba Engleză Paperback – 24 oct 2019
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. 

The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.

Citește tot Restrânge

Din seria Communications in Computer and Information Science

Preț: 32538 lei

Preț vechi: 40673 lei
-20% Nou

Puncte Express: 488

Preț estimativ în valută:
6227 6468$ 5173£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789811507571
ISBN-10: 9811507570
Pagini: 740
Ilustrații: XII, 276 p. 197 illus., 59 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.41 kg
Ediția:1st ed. 2019
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science

Locul publicării:Singapore, Singapore

Cuprins

Web Scanner Detection Based on Behavioral Differences.- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation.- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing.- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network.- Development of an Early Warning System for Network Intrusion Detection using Benford’s Law Features.- An RTP Extension for Reliable User-data Transmission over VoIP Traffic.- A Hybrid Covert Channel with Feedback over Mobile Networks.- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.- Integer Version of Ring-LWE and its Applications.- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension.- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.- Exploit in smart devices: A case study.- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu.- Online Event Detection in Social Media with Bursty Event Recognition.- Predicting Users' Emotional Intelligence with Social Networking Data.- Design and Implementation of Medical Dispute Governance Based on Blockchain.- Greedily Remove k links to hide important individuals in social network.- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System.- Blockchain-based Threshold Electronic Voting System.- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication.- Learning from Imbalanced Data: A Comparative Study.