語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Mobile Internet Security = Second In...
~
Kotenko, Igor.
Mobile Internet Security = Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Mobile Internet Security/ edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko.
其他題名:
Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /
其他作者:
You, Ilsun.
面頁冊數:
X, 181 p. 146 illus., 75 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-981-13-3732-1
ISBN:
9789811337321
Mobile Internet Security = Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /
Mobile Internet Security
Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /[electronic resource] :edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko. - 1st ed. 2019. - X, 181 p. 146 illus., 75 illus. in color.online resource. - Communications in Computer and Information Science,9711865-0929 ;. - Communications in Computer and Information Science,498.
Networks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
ISBN: 9789811337321
Standard No.: 10.1007/978-981-13-3732-1doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Mobile Internet Security = Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /
LDR
:03168nam a22003975i 4500
001
1011301
003
DE-He213
005
20201103071839.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811337321
$9
978-981-13-3732-1
024
7
$a
10.1007/978-981-13-3732-1
$2
doi
035
$a
978-981-13-3732-1
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Mobile Internet Security
$h
[electronic resource] :
$b
Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers /
$c
edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
X, 181 p. 146 illus., 75 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
971
505
0
$a
Networks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications.
520
$a
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Artificial intelligence.
$3
559380
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
You, Ilsun.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1255374
700
1
$a
Chen, Hsing-Chung.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1284624
700
1
$a
Sharma, Vishal.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1116625
700
1
$a
Kotenko, Igor.
$e
editor.
$1
https://orcid.org/0000-0001-6859-7120
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1284625
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811337314
776
0 8
$i
Printed edition:
$z
9789811337338
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-981-13-3732-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入