語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and Privacy in Social Netwo...
~
Meng, Weizhi.
Security and Privacy in Social Networks and Big Data = 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security and Privacy in Social Networks and Big Data/ edited by Weizhi Meng, Steven Furnell.
其他題名:
5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /
其他作者:
Meng, Weizhi.
面頁冊數:
XII, 276 p. 197 illus., 59 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-981-15-0758-8
ISBN:
9789811507588
Security and Privacy in Social Networks and Big Data = 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /
Security and Privacy in Social Networks and Big Data
5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /[electronic resource] :edited by Weizhi Meng, Steven Furnell. - 1st ed. 2019. - XII, 276 p. 197 illus., 59 illus. in color.online resource. - Communications in Computer and Information Science,10951865-0929 ;. - Communications in Computer and Information Science,498.
Web Scanner Detection Based on Behavioral Differences -- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation -- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing -- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network -- Development of an Early Warning System for Network Intrusion Detection using Benford’s Law Features -- An RTP Extension for Reliable User-data Transmission over VoIP Traffic -- A Hybrid Covert Channel with Feedback over Mobile Networks -- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things -- Integer Version of Ring-LWE and its Applications -- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension -- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing -- Exploit in smart devices: A case study -- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu -- Online Event Detection in Social Media with Bursty Event Recognition -- Predicting Users' Emotional Intelligence with Social Networking Data -- Design and Implementation of Medical Dispute Governance Based on Blockchain -- Greedily Remove k links to hide important individuals in social network -- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System -- Blockchain-based Threshold Electronic Voting System -- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication -- Learning from Imbalanced Data: A Comparative Study. .
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
ISBN: 9789811507588
Standard No.: 10.1007/978-981-15-0758-8doiSubjects--Topical Terms:
555385
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Security and Privacy in Social Networks and Big Data = 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /
LDR
:03618nam a22003975i 4500
001
1007392
003
DE-He213
005
20200629162758.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811507588
$9
978-981-15-0758-8
024
7
$a
10.1007/978-981-15-0758-8
$2
doi
035
$a
978-981-15-0758-8
050
4
$a
TK5105.59
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Security and Privacy in Social Networks and Big Data
$h
[electronic resource] :
$b
5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /
$c
edited by Weizhi Meng, Steven Furnell.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
XII, 276 p. 197 illus., 59 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
1095
505
0
$a
Web Scanner Detection Based on Behavioral Differences -- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation -- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing -- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network -- Development of an Early Warning System for Network Intrusion Detection using Benford’s Law Features -- An RTP Extension for Reliable User-data Transmission over VoIP Traffic -- A Hybrid Covert Channel with Feedback over Mobile Networks -- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things -- Integer Version of Ring-LWE and its Applications -- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension -- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing -- Exploit in smart devices: A case study -- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu -- Online Event Detection in Social Media with Bursty Event Recognition -- Predicting Users' Emotional Intelligence with Social Networking Data -- Design and Implementation of Medical Dispute Governance Based on Blockchain -- Greedily Remove k links to hide important individuals in social network -- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System -- Blockchain-based Threshold Electronic Voting System -- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication -- Learning from Imbalanced Data: A Comparative Study. .
520
$a
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computer security.
$3
557122
650
0
$a
Application software.
$3
528147
650
1 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
700
1
$a
Meng, Weizhi.
$e
editor.
$1
https://orcid.org/0000-0003-4384-5786
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1298060
700
1
$a
Furnell, Steven.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
676786
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811507571
776
0 8
$i
Printed edition:
$z
9789811507595
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-981-15-0758-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入