語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Artificial Intelligence and Security...
~
Bertino, Elisa.
Artificial Intelligence and Security = 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Artificial Intelligence and Security/ edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino.
其他題名:
5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV /
其他作者:
Sun, Xingming.
面頁冊數:
XVII, 651 p. 252 illus., 134 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-24268-8
ISBN:
9783030242688
Artificial Intelligence and Security = 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV /
Artificial Intelligence and Security
5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV /[electronic resource] :edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino. - 1st ed. 2019. - XVII, 651 p. 252 illus., 134 illus. in color.online resource. - Security and Cryptology ;11635. - Security and Cryptology ;9241.
Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
ISBN: 9783030242688
Standard No.: 10.1007/978-3-030-24268-8doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Artificial Intelligence and Security = 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV /
LDR
:06815nam a22004215i 4500
001
1014323
003
DE-He213
005
20200716131006.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030242688
$9
978-3-030-24268-8
024
7
$a
10.1007/978-3-030-24268-8
$2
doi
035
$a
978-3-030-24268-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Artificial Intelligence and Security
$h
[electronic resource] :
$b
5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV /
$c
edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XVII, 651 p. 252 illus., 134 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11635
505
0
$a
Encryption and Cybersecurity -- A Gray-Box Vulnerability Discovery Model based on Path Coverage -- Quantum Network Coding Based on Entanglement Distribution -- Moving Target Defense in Preventing SQL Injection -- Design and Security Analysis of Certificateless Aggregate Signature Scheme -- SuperEye: a Distributed Port Scanning System -- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data -- NCGs: Building A Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis -- Short Text Topic Recognition and Optimization Method for University Online Community -- A Survey on Network Traffic Identification -- A Survey of Network Security Situational Awareness Technology -- Multi-function Quantum Cryptography Protocol Based On Bell State -- The Attack Case of ECDSA on Blockchain based on Improved Simple Power Analysis -- A Weight-Based Channel Estimation Implementation Algorithm -- Multi-Party Quantum Communication Complexity on Composite Boolean-Valued Function -- BlockZone: A Blockchain-based DNS Storage and Retrieval Scheme -- Robust Analysis of Grid System Based on Complex Network Attack Mode -- A Secure Data Aggregation Protocol in VANETs based on Multi-key FHE -- Research on SQL Injection and Defense Technology -- A Review of the Factorization Problem of Large Integers -- A Comparison of Machine Learning Algorithms for Detecting XSS Attacks -- A Survey of Privacy-Preserving Techniques for Blockchain -- A Survey of Software Reverse Engineering Applications -- A Fast IP Matching Algorithm under Large Traffic -- An Effective Load Balance using Link Bandwidth for SDN-based Data Centers -- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric -- Research on Content Extraction of Rich Text Web Pages -- Network Protocol Analysis base on WeChat PC Version -- Bitcoin Network Size Estimation Based on Coupon Collection Model -- A Survey of the Software Vulnerability Discovery using Machine Learning Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel Threshold Signature Scheme Based on Elliptic Curve with designated verifier -- A Congestion Control Methodology with Probability Routing based on MNL for Datacenter Network -- Fast Failover for Link Failures in Software Defined Networks -- Steady-state Topology Discovery of Target Networks based on Statistics Method -- A Novel Method for Weighted Throughput Fairness in Contention-based WLANs with Multiple Priority Levels -- Bitcoin Node Discovery: Large-scale Empirical Evaluation of Network Churn -- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory -- Webshell Detection Model based on Deep Learning -- A Security-Sensitive Function Mining Framework for Source Code -- Abstraction of Operations in Trusted Components Based on OR-transition Colored Petri Net -- Trusted Component Decomposition Based on OR-transition Colored Petri Net -- High-Speed File Transferring over Linux Bridge for QGA Enhancement in Cyber Range -- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents using Reinforcement Learning -- Identify Influentials Based on User behavior Across Different Topics -- Taylor Series Localization Algorithm Based on Semi-definite Programming -- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene -- An evolving network model based on a triangular connecting mechanism for the Internet topology -- A new quantum private query protocol with better performance in resisting joint-measurement attack -- PPCSB:A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid -- Blockchain Private Key Storage Algorithm Based on Image Information Hiding -- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning -- JPEGCNN:A Transform Domain Steganalysis Model Based On Convolutional Neural Network -- Quantum algorithm for support vector machine with exponentially improved dependence on precision -- Reliability-based and QoS-aware Service Redundancy Backup Method in IoT-based Smart Grid -- A Privacy-Preserving Electricity Trading Scheme Based on Blockchain -- A Novel Facial Expression Recognition Scheme based on Deep Neural Networks -- Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis -- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust.
520
$a
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Application software.
$3
528147
650
0
$a
Software engineering.
$3
562952
650
0
$a
Computers.
$3
565115
650
0
$a
Law and legislation.
$3
1069250
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Software Engineering.
$3
669632
650
2 4
$a
Legal Aspects of Computing.
$3
669901
700
1
$a
Sun, Xingming.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1171801
700
1
$a
Pan, Zhaoqing.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1209225
700
1
$a
Bertino, Elisa.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
675398
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030242671
776
0 8
$i
Printed edition:
$z
9783030242695
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-24268-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入